OV 14 - 1 Copyright © 2011 Element K Content LLC. All rights reserved. Network Management  Network Monitoring  Configuration Management Documentation.

Slides:



Advertisements
Similar presentations
Network Systems Sales LLC
Advertisements

Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Communication and Networking Services Networking Services.
Network+ Guide to Networks, Fourth Edition
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Optimizing Windows Vista Performance Lesson 10. Skills Matrix Technology SkillObjective DomainObjective # Introducing ReadyBoostTroubleshoot performance.
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
© 2006 Cisco Systems, Inc. All rights reserved. Module 4: Implement the DiffServ QoS Model Lesson 4.10: Deploying End-to-End QoS.
Chapter 19: Network Management Business Data Communications, 4e.
Monitoring a Large-Scale Network: Selecting the Right Tool Sayadur Rahman United International University & Network Manager, Financial Service.
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 14 Server and Network Monitoring.
Maintaining and Updating Windows Server 2008
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Network security policy: best practices
1 Enabling Secure Internet Access with ISA Server.
Connecting LANs, Backbone Networks, and Virtual LANs
Internet Traffic Management Prafull Suryawanshi Roll No - 04IT6008.
Existing Network Study CPIT 375 Data Network Designing and Evaluation.
Hands-on Networking Fundamentals
Network Management Chapter 18. Objectives Describe how configuration management documentation enables you to manage and upgrade a network efficiently.
Mike Meyers’ CompTIA Network+ ® Guide to Managing and Troubleshooting Networks, Third Edition (Exam N ) © 2012 The McGraw-Hill Companies, Inc. All.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Robert E. Meyers CCNA, CCAI Youngstown State University Manager, Cisco Regional Academy Cisco Networking Academy Program Semester 4, v Chapter 7:
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Internet Traffic Management. Basic Concept of Traffic Need of Traffic Management Measuring Traffic Traffic Control and Management Quality and Pricing.
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
1. There are different assistant software tools and methods that help in managing the network in different things such as: 1. Special management programs.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
Information Services June 2015 Information Services June 2015 Information Services_ ctybrd16june15.1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
Week #3: Configuring and Troubleshooting DHCP
Overview Managing a DHCP Database Monitoring DHCP
Maintaining and Updating Windows Server Monitoring Windows Server It is important to monitor your Server system to make sure it is running smoothly.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
Module 4: Configuring and Troubleshooting DHCP
Chapter 13: LAN Maintenance. Documentation Document your LAN so that you have a record of equipment location and configuration. Documentation should include.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
1 Root-Cause VoIP Troubleshooting Optimizing the Process Tim Titus CTO, PathSolutions.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Network Troubleshooting
Monitoring and Managing Server Performance. Server Monitoring To become familiar with the server’s performance – typical behavior Prevent problems before.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
Network design Topic 2 Existing network infrastructure.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Introduction to Computer Networks Introduction to Computer Networks.
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
UNIT 6 SEMINAR Unit 5 Chapter 7 and 8, plus Lab 10 Course Name – IT Network Design Instructor – Jan McDanolds, MS, Security+ Contact Information:
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 12 Chapter 14 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with.
Maintaining and Updating Windows Server 2008 Lesson 8.
© 2003, Cisco Systems, Inc. All rights reserved. 2-1 Campus Network Design.
Chapter 19: Network Management
Instructor Materials Chapter 6: Quality of Service
Chapter 9 Optimizing Network Performance
Instructor Materials Chapter 8: Network Troubleshooting
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Quality of Service Connecting Networks.
Unit 27: Network Operating Systems
An Introduction to Computer Networking
IS4680 Security Auditing for Compliance
Network+ Guide to Networks, Fourth Edition
Requirements Definition
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Management  Network Monitoring  Configuration Management Documentation  Network Performance Optimization

OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Management Network management OperationsAdministrationMaintenanceProvisioning

OV Copyright © 2011 Element K Content LLC. All rights reserved. SNMP SNMP management system Servers Routers Printers

OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Monitoring Tools PurposeTools LAN monitoring  Remote Monitoring (RMON)  pathping  OpManager  Distinct Network Monitor  Solarwinds ipMonitor QoS monitoring  QoS parameters  Router parameters  Load balancing  NimBus  XenMon  RT Audio and RT Video

OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Monitoring Tools (Cont.) PurposeTools Bandwidth monitoring  Netflow analyzer  Rokario  Du Meter WAN monitoring  Exinda  Router monitoring  Castlerock  Visual Up Time  AdvantNet  Observer

OV Copyright © 2011 Element K Content LLC. All rights reserved. Categories of Network Monitoring Tools Network monitoring tools are broadly classified into three functional categories:  Status monitoring – Used to gather data related to the status of a network.  Traffic monitoring – Used to gather data related to the traffic generated on a network.  Route monitoring – Used to trace the route taken by packets and detect routing delays, if any.

OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Traffic Analysis Network traffic analysis include:  Identification of the inbound and outbound protocols.  Identifying if the ports that are open and closed.  Checking the traffic that passes through a firewall.  Checking the throughput, threshold limits, and the overall network performance.  Tracing packets on the network.  Studying network utilization.

OV Copyright © 2011 Element K Content LLC. All rights reserved. Port Filtering TCP UDP

OV Copyright © 2011 Element K Content LLC. All rights reserved. Traffic Filtering Filtered content

OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Diagnostics Some of the activities performed by the diagnostics tools are:  Monitors end-to-end application response time.  Analyzes network traffic.  Manages device performance.  Monitors and alerts availability, bandwidth utilization, and health of devices.  Provides network diagnostics for troubleshooting and resolving issues.  Offers network discovery tools that facilitate IP address management, port mapping, and ping sweeps.  Provides tools for real-time NetFlow analysis, configuration, and device management.

OV Copyright © 2011 Element K Content LLC. All rights reserved. System Performance Monitors System performance monitors:  Monitors services, processes, and resources  Counters and thresholds  Can be included in the operating system or separate software tools  Examples:  UNIX/Linux: top  Windows: Windows Reliability and Performance Monitor

OV Copyright © 2011 Element K Content LLC. All rights reserved. Protocol Analyzers Displays captured frames and contents

OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Fault Tolerance One system fails, another takes over

OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Administration  Network administration covers support functions required to manage a network.  Administration of a network includes:  Designing the network  Tracking usage  Assigning addresses  Planning upgrades  Taking service orders  Keeping track of network inventory  Collecting accounting data, and billing customers.

OV Copyright © 2011 Element K Content LLC. All rights reserved. Configuration Management Configuration management database contains records of the topology

OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Documentation  Network maps  Location and routing information  Device information  Hardware and software configuration, including changes  Utilization statistics  Usage logs and reports  Policies and procedures  Guidelines for performing network management tasks

OV Copyright © 2011 Element K Content LLC. All rights reserved. Physical Network Diagrams 12-port switch File Server Remote Access Server Mail Server Web Server12-port switch 24-port switch

OV Copyright © 2011 Element K Content LLC. All rights reserved. Logical Network Diagrams File Server Mail Server Web Server Sample Internal Network: IP: Host name: mail.everythingforcoffee.com IP: Host name: mail.everythingforcoffee.com IP: Host name: Fs01.everythingforcoffee.com IP: Host name: Fs01.everythingforcoffee.com IP: Host name: IP: Host name:

OV Copyright © 2011 Element K Content LLC. All rights reserved. Critical Hardware and Software Inventories Hardware Inventory Entry Information to Include Standard workstation A basic description of a standard client workstation. Include minimum requirements and the installed operating system as well as how many workstations of this type are deployed. Specialty workstation A description of any specialty workstations deployed. Include a brief description of their roles and special configurations implemented on them. Basic server A list of the basic server hardware configuration and the role of these servers. Connectivity hardware A list of all connectivity hardware in as much detail as possible. Backup hardware Document critical information about the backup hardware, such as the vendor and model number of a tape drive, backup hard drives, DVD drives, and network attached storage if applicable.

OV Copyright © 2011 Element K Content LLC. All rights reserved. Critical Hardware and Software Inventories (Cont.) Software Inventory Entry Information to Include Operating system software All operating system software, including desktop and server operating systems. Productivity and application software Off-the-shelf productivity software, including any applications installed on client machines and servers. Maintenance utilities The utilities used to maintain a network, especially backup software and software configuration. Backup documentation Records of when backups were taken, how frequently to take them, what backups contain, where backups are stored, and credentials needed to restore backups. Overall asset inventory If your company maintains an overall asset inventory, attach a copy. Many companies use the inventory as a base to track hardware and maintenance.

OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Policies One of a set of formalized statements defining network functions Establishes expectations for users, management, and IT personnel Acceptable use of network equipment

OV Copyright © 2011 Element K Content LLC. All rights reserved. Legal Compliance Requirements and Regulations  Organizations must consider their legal obligations, rights, liabilities, and limitations when creating policies.  Information security practices must comply with legal requirements that are documented in other departmental policies

OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Baselines  Documents the network’s current performance level.  Reveals were bottlenecks are impeding system performance.  Provides evidence for upgrading systems.

OV Copyright © 2011 Element K Content LLC. All rights reserved. The Network Baselining Process 2. Design tests 3. Schedule tests 4. Run tests 5. Document results 6. Analyze data 7. Repeat tests when performance low 1. Evaluate network 8. Upgrade or reconfigure as needed

OV Copyright © 2011 Element K Content LLC. All rights reserved. QoS Different types of network traffic have different requirements Different types of network traffic have different requirements SLA SLA includes parameters and remedies for failure

OV Copyright © 2011 Element K Content LLC. All rights reserved. The Need for QoS Video Voice Data Audio Traditional data applications need lower packet loss Traditional data applications need lower packet loss Real-time applications need higher bandwidth priority Real-time applications need higher bandwidth priority

OV Copyright © 2011 Element K Content LLC. All rights reserved. QoS Parameters ParameterDescription Bandwidth The average number of bits of data that can be transmitted from a source to a destination over the network in one second. Latency Also called lag or delay is the time difference between transmission of a signal and when it was received. Jitter The variability over time in latency between sequentially transmitted data packets. Packet loss The number of packets that are lost or damaged during transmission. Echo A reflected sound, a distinct repetition of the original sound—a familiar phenomenon in phone calls when you hear your own voice after a few milliseconds (ms).

OV Copyright © 2011 Element K Content LLC. All rights reserved. Traffic Shaping  A mechanism in QoS for introducing some amount of delay in traffic that exceeds an administratively defined rate.  Smoothes down traffic burst.  Does not drop packets.

OV Copyright © 2011 Element K Content LLC. All rights reserved. Load Balancing Without load balancing, one server can be inundated with requests while others remain idle. With load balancing, request are more evenly distributed among the available servers.

OV Copyright © 2011 Element K Content LLC. All rights reserved. High Availability High data availability

OV Copyright © 2011 Element K Content LLC. All rights reserved. Caching Engines Indexes data for faster responses to requests Caching Engine

OV Copyright © 2011 Element K Content LLC. All rights reserved. High Bandwidth Applications Computer running high bandwidth application Computer running high bandwidth application

OV Copyright © 2011 Element K Content LLC. All rights reserved. Factors Affecting a QoS Implementation QoS Implementation Factor Description Packet classification Each packet coming to a router is classified based on its QoS requirements. This classification enables the router to process the packet based on its resource requirement. Policing An application requests the required amount of network resources, and it must always adhere to this request. An application must not send packets at a rate more than what was requested. Appropriate resource allocation A network may receive both data and voice packets simultaneously. It is the network device’s responsibility to appropriately allocate resources to both these types of data. Call admission Once a network receives a QoS request, it verifies the available network resources to see if it can provide the required quality. In case of unavailability of network resources, the network can deny the request.

OV Copyright © 2011 Element K Content LLC. All rights reserved. Reflective Questions 1. What network optimization tools, methods, or techniques do you feel will be most important to you as you manage your organization's network for optimal performance? 2. What are the network monitoring activities you are likely to perform in your organization?