Introduction to Telecommunications by Gokhale CHAPTER 9 NETWORK MANAGEMENT.

Slides:



Advertisements
Similar presentations
Guide to Network Defense and Countermeasures Second Edition
Advertisements

5-Network Defenses Dr. John P. Abraham Professor UTPA.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Network+ Guide to Networks, Fourth Edition
Lecture 1: Overview modified from slides of Lawrie Brown.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
Chapter 19: Network Management Business Data Communications, 4e.
Security+ Guide to Network Security Fundamentals
IS Network and Telecommunications Risks
Computers Are Your Future © 2008 Prentice-Hall, Inc.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Computer Security: Principles and Practice
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Stephen S. Yau CSE , Fall Security Strategies.
Computer Networks IGCSE ICT Section 4.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Intranet, Extranet, Firewall. Intranet and Extranet.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
COEN 252 Computer Forensics
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Chapter 13 – Network Security
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
IT Infrastructure Chap 1: Definition
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Configuring Network Access Protection
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Chapter 2 Securing Network Server and User Workstations.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Module 11: Designing Security for Network Perimeters.
Network Operating Systems : Tasks and Examples Instructor: Dr. Najla Al-Nabhan
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
CHAPTER - 4 COMPUTER NETWORK Dr. BALAMURUGAN MUTHURAMAN
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
CEG 2400 FALL 2012 Chapter 1 An Introduction to Networking 1.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Working at a Small-to-Medium Business or ISP – Chapter 8
Network Security Basics: Malware and Attacks
Implementing Network Access Protection
Firewalls.
Security in Networking
Unit 27: Network Operating Systems
An Introduction to Computer Networking
IS4680 Security Auditing for Compliance
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Introduction to Telecommunications by Gokhale CHAPTER 9 NETWORK MANAGEMENT

2 Introduction Network Management encompasses both human and automated tasks that support the creation, operation and evolution of a network For a network to be effective and efficient over a long period of time, a network management plan must have two goals: Prevent problems where possible Prepare for problems that will mostly likely occur

3 Responsibilities of a Network Manager Policy Management Evaluation of Hardware and Software Network Administration & Maintenance Network Security Configuration Management

4 Policy Management Policy management is an implementation of a set of rules or policies to dictate user connectivity and network resource priorities. It includes three fundamental functions: –Configuring network switches and routers –Verifying (or auditing) network operation –Enforcing the policies, especially technology standards

5 Evaluation of Network Hardware Client/Server Environment Critical Issues –Server response time Dedicated server Remote access server –Server’s ancillary storage: RAID RAID 0 (Striping) RAID 1 (Mirroring) RAID 3, 4, or 5 (Parity-checking RAID) –Server downtime (for upgrades or maintenance) –Server utilization rate Network administrators are often called on to advise users about ergonomic design of a workstation

6 RAID 0 (also called Striping)

7 RAID Levels: 1 (Mirroring), and 3, and 5 (Parity-Checking)

8 Ergonomically-designed Workstation Courtesy of Telecommunications for Managers 4/E by Rowe, S.H., copyright Reprinted with permission of Prentice-Hall, Inc., Upper Saddle River, N.J.

9 Network Software Network software must be chosen based on needs ― present and future ― and a careful comparison of the capabilities of the existing product, as well as on the vendor’s capabilities to deliver future upgrades –Platform Underlying system on which applications run Consists of an operating system and a microprocessor Example: Windows XP, Mac OS X, Linux –Network Operating System (NOS) Provides centralized administration of the entire network

10 Evaluation Characteristics of NOS Architecture Functionality, Reliability, Scalability Broad Network Media and Client Support Network Services and Applications Support for Different Network Protocols Server Management Application Development Tools

11 Network Administration and Maintenance Network administration and maintenance –An infrastructure of techniques and procedures that assure the proper day-to-day operation of the network –Detect failures and degraded performance –Take corrective action before services are effected –Manage network changes to minimize disruption –Keep abreast of emerging technologies

12 Network Operations Center (NOC) NOC is usually a separate room from which a telecommunications network is managed, monitored, and maintained to endure uninterrupted service for its users NOC is the focal point for troubleshooting, software distribution and update, and performance monitoring

13 Day-to-Day Maintenance Tasks of a Network Administrator Provide timely communications Monitor and control disk space Add to and maintain user login information and workstation information Setup and Internet access accounts Manage resource and file access Monitor and reset network devices Update security software Install software upgrades for servers and workstations Maintain records of user accounting and billing

14 Implementing Virtual LANs VLAN is a switched network that is logically segmented by functions, project teams, or applications, rather than on a physical or geographical basis Network is reconfigured through software rather than by physically moving devices VLAN software is mostly proprietary VLAN implements the corollary: switch when you can, route when you must

15 VLAN

16 Network Utilization Network Utilization is defined as the ratio of total load to network capacity Since utilization cannot exceed 100%, transmitted frames beyond network capacity are lost and must be repeated

17 Network Security Computer and Network Security can be defined as the protection of network- connected resources against unauthorized disclosure, modification, utilization, restriction, incapacitation, or destruction Computer security –Tools to support stored data Network security –Tools to support data during its transmission

18 Network Security Measures at Different Layers of the OSI Model

19 Types of Security Threats Security threats divided into two categories: –Passive threats Involve monitoring the transmission data of an organization. These threats are difficult to detect because they do not involve alteration of the data –Active threats Involve some modification of the data stream or the creation of a false stream. These threats are most successful when directed at the weakest link in the overall system, namely, at the host level

20 Viruses and Worms Virus –A program that affects other programs by modifying them; the modified program includes a copy of the virus program, which can then go on to infect other programs Worm –A program that makes use of networking software to replicate itself and move from system to system; it performs some detrimental activity on the system it gains access to

21 Vulnerability Assessment Vulnerability assessment –Identifies points of exposures in the network Internal assessment –Internal audits External assessment –May require outsourcing security services to perform penetration tests

22 Vulnerability Management Vulnerability Management is a cyclic process

23 Security Measures Authorization –user ID and password Encryption –Hash functions –Private Key –Public Key Authentication –Certificate Authority (CA) Intrusion Detection Systems (IDS) Firewall

24 Encryption Process: Public Key and Private Key

25 Certification Authority (CA)

26 Intrusion Detection Systems (IDS) Monitoring/analysis tools –Active monitoring Notifies administrator whenever an incident occurs –Passive monitoring Keeps a log of each activity for review later Port Mirroring –Mirrors the switched traffic to an analyzer –May drop packets due to buffer overflow, and filters anomalies like corrupt network packets In-line Taps –Sees 100% of the traffic

27 Firewall Firewall is a piece of hardware and software that allows limited access into and out of one’s network from the Internet Firewalls are classified into three categories: –Packet filters –Application-level gateways –Proxy servers

28 Security Provisions in a VPN Security gateways Security policy servers Certification Authorities (CA)

29 Network Applications and Services: Storage –Direct Attached Storage (DAS) Attached directly to a server, most secure Supports only a homogeneous network environment –Network Attached Storage (NAS) Disk storage that is set up with its own network address rather than being attached to the server Support heterogeneous data sharing Provide file access services –Storage Area Network Composed of servers and storage devices that are connected by a network infrastructure Provides block-access Supports only a homogeneous network environment

30 Network Applications and Services Network Application Software –Three-tier versus two-tier application Business Continuance: processes and procedures put in place to ensure that essential functions can continue during and after a disaster –Asynchronous replication Enables fast recovery Not appropriate for critical applications –Synchronous replication Also called “mirroring” Maintains complete data integrity Expensive and slow

31 Telecommunications Management Network (TMN) TMN architecture has three parts: –Logical Specifies the management functions and reference points for data exchange between the functions –Physical Defines how management functions are implemented on real systems and the interfaces between them –Information Defines the data structures