انستیتیوت تکنالوجی معلوماتی دیپارتمنت تکنالوجی معلوماتی IT 424 NETWORK ADMINISTRATION.

Slides:



Advertisements
Similar presentations
Models of Network Administration Week 5. Understanding the system as a whole Requires ability to see relationships and dependencies between distinct parts.
Advertisements

2 Introduction A central issue in supporting interoperability is achieving type compatibility. Type compatibility allows (a) entities developed by various.
Welcome to Middleware Joseph Amrithraj
Chapter 19: Network Management Business Data Communications, 5e.
Chapter 7 LAN Operating Systems LAN Software Software Compatibility Network Operating System (NOP) Architecture NOP Functions NOP Trends.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Chapter 19: Network Management Business Data Communications, 4e.
Active Directory: Final Solution to Enterprise System Integration
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Network+ Guide to Networks, Fourth Edition Chapter 10 Netware-Based Networking.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Windows 2000 Remote Access. Remote Access Overview With Windows 2000 remote access, remote access clients connect to remote access servers and are transparently.
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
Maintaining and Updating Windows Server 2008
1 Chapter Overview Introduction to Windows XP Professional Printing Setting Up Network Printers Connecting to Network Printers Configuring Network Printers.
Understanding Active Directory
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
1 CSIT 320. Just as the combination of a database and a database management system collects and organizes information about an institution/company/… as.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
1 Chapter Overview Understanding the Windows 2000 Networking Architecture Using Microsoft Management Console.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
BASIC NETWORK CONCEPTS (PART 6). Network Operating Systems NNow that you have a general idea of the network topologies, cable types, and network architectures,
1 Chapter Overview Network Operating Systems Network Clients Directory Services.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
1 Microsoft Distributed File System (Dfs) Brett O’Neill CSE 8343 – Group A6.
Introduction to Networking Concepts. Introducing TCP/IP Addressing Network address – common portion of the IP address shared by all hosts on a subnet/network.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
1 Guide to Novell NetWare 6.0 Network Administration Chapter 11.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
1 Guide to Novell NetWare 6.0 Network Administration Chapter 13.
Chapter 9: Novell NetWare
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Windows 2000 Operating System -- Active Directory Service COSC 516 Yuan YAO 08/29/2000.
1 Chapter Overview Routing Principles Building Routing Tables.
COMP1321 Digital Infrastructure Richard Henson February 2014.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
TCP/IP fundamentals Unit objectives Discuss the evolution of TCP/IP Discuss TCP/IP fundamentals.
September 18, 2002 Windows 2000 Server Active Directory By Jerry Haggard.
5.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 5: Planning.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Chapter2 Networking Fundamentals
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
WEEK 11 – TOPOLOGIES, TCP/IP, SHARING & SECURITY IT1001- Personal Computer Hardware System & Operations.
Models of Network Administration Burgess (2 nd Ed) Chapter 6.
Introduction to Active Directory
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring Windows Server 2008 Printing.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
Maintaining and Updating Windows Server 2008 Lesson 8.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Topic 11 Network Management. SNMPv1 This information is specific to SNMPv1. When using SNMPv1, the snmpd agent uses a simple authentication scheme to.
1 Directory Services  What is a Directory Service?  Directory Services model  Directory Services naming model  X.500 and LDAP  Implementations of.
File System Implementation
Networks Software.
An Introduction to Computer Networking
Examining a Windows NT Infrastructure (2)
Lesson 16-Windows NT Security Issues
A Network Operating System Edited By Maysoon AlDuwais
Presentation transcript:

انستیتیوت تکنالوجی معلوماتی دیپارتمنت تکنالوجی معلوماتی IT 424 NETWORK ADMINISTRATION

Covered Topics:  Information models and directory service  Network administration model  Network management Technologies  Creating infrastructure  System maintenance model  Configuration policy  Methods  Automation of host configuration  Preventative host maintenance  SNMP tool Unit 3

Information models and directory service  One way of binding together an organization is through a structured information model – a database of its personnel, assets and services  Directory service: A collection of open systems that cooperate to hold a logical database of information about a set of objects in the real world  Directory services are often referred to using the terms White Pages and Yellow Pages that describe how a directory is used.  If one starts with a lookup key for a specific resource, then this is called White Pages lookup – like finding a number in a telephone book.

Information models and directory service (Cont.)  If one does not know exactly what one is looking for, but needs a list of possible categories to match, such as in browsing for users or services, then the service is referred to as Yellow Pages.  An implementation of yellow pages called Yellow Pages or YP was famously introduced into Unix by Sun Microsystems and later renamed the Network Information Services (NIS) in the 1980s due to trademark issues with British Telecom(BT).  they were used for storing common data about users and user groups

X.500 information model  In the 1970s, attempts were made to standardize computing and telecommunications technologies.  One such standard that emerged was the OSI (Open Systems Interconnect) model (ISO 7498), which defined a seven-layered model for data communication.  In 1988, ISO 9594 was defined, creating a standard for directories called X.500.  X.500 specifies a Directory Access Protocol (DAP) for addressing a hierarchical directory, with powerful search functionality.

X.500 information model (Cont.)  Since DAP is an application layer protocol, it requires the whole OSI management model stack of protocols in order to operate.  This required more resources than were available in many small environments  LDAP was thus defined and implemented in a number of draft standards.  The current version is LDAP v3, defined in RFC 2251–2256.  LDAP is an Internet open standard and is designed to be inter-operable between various operating systems and computers.  It employs better security than previous open standards (like NIS).

X.500 information model (Cont.)  It is therefore gradually replacing, or being integrated with, vendor specific systems including the Novell Directory Service (NDS) and the Microsoft Active Directory (AD).  All of the entries in an X.500 directory are arranged hierarchically, forming a Directory Information Tree (DIT).

Unix legacy directories  Before networking became commonplace, Unix hosts stored directory information in the /etc file directory, in files such as /etc/passwd, /etc/services and so on.  In the 1980s this was extended by a network service that could bind hosts together with a common directory for all hosts in a Local Area Network.  Sun Microsystems, who introduced the service, called it ‘YP’ or Yellow Pages, but later had to change the name to the Network Information Service (NIS)

Unix legacy directories  The original NIS directory was very popular, but was both primitive, non- hierarchical and lacked an effective security model and was thus replaced by ‘NIS+’ which was able to add strong authentication to queries, and allow modernized and more flexible schema.  NIS+ never really caught on, and it is now being replaced by an open standard LDAP(Lightweight Directory Access Protocol).

OpenLDAP  The OpenLDAP implementation is the reference implementation for Unix- like systems.  The strength of LDAP is its versatility and interoperability with all operating systems.  Its disadvantage is its somewhat arbitrary and ugly syntactical structure, and its vulnerability to loss of network connectivity.

Novell Directory Service – NDS  Novell Netware was originally a centralized sharing service that allowed a regiment of PCs to connect to a common disk and a common printer, thus allowing expensive hardware to be shared amongst desktop PCs.  As PCs have become more network-able, Netware has developed into a sophisticated directory-based server suite.  The Novell directory keeps information about all devices and users within its domain: users, groups, print queues, disk volumes and network services.

Active Directory – AD  Early versions of Windows were limited by a flat host infrastructure model that made it difficult to organize and administer Windows hosts rationally by an information model.  Active Directory is the directory service introduced with and integrated into Windows  It replaces the Domain model used in NT4, and is based on concepts from X.500.  It is LDAP compatible.

Active Directory – AD (Cont.)  In the original Windows network software, naming was based around proprietary software such as WINS(Windows Internet Name Service).  Windows has increasingly embraced open standards like DNS, and has chosen the DNS naming model for LDAP integration.  The Active Directory is still being developed.

Network administration models  Central management ‘star’ model  The traditional (idealized) model of host configuration is based on the idea of remote management (e.g. using SNMP).  Here one has a central manager who decides and implements policy from a single location, and all networks and hosts are considered to be completely reliable.  The manager must monitor the whole network, using bi-directional communication.  This leads to an N: 1 ratio of clients to manager

Network administration models (Cont.)  Central management ‘star’ model

Network administration models (Cont.)  Mesh topology with centralized policy and local enforcement  Communication over a mesh topology, with policy choice made hierarchically.  Sub-controllers (dark nodes) edit policy as received from the central controller, and pass the result to members of the local group  The final step in increasing autonomy is the free exchange of information between arbitrary hosts.  Hosts can now offer one another information, policy or source materials in accordance with an appropriate trust model.

Network administration models (Cont.)  Mesh topology with centralized policy and local enforcement

Network management technologies  The ability to read information about the performance of network hardware via the network itself is an attractive idea.  Suppose we could look at a router on the second floor of a building half a mile away and immediately see the load statistics, or the number of rejected packets it has seen; or perhaps the status of all printers on a subnet.  That would be useful diagnostic information.

Network management technologies (Cont.)  SNMP network management  The Simple Network Management Protocol (SNMP) is a protocol designed to do just this.  SNMP was spawned in 1987 as a Simple Gateway Monitoring Protocol, but was quickly extended and became a standard for network monitoring.  SNMP was designed to be small and simple enough to be able to run on even minor pieces of network technology like bridges and printers.  SNMP has often been criticized for the weak security of its agents, which are configured by default with a clear text password of ‘public’.  Version 3 of the SNMP protocol was finally agreed on and published in December 2002 in order to address these problems, using strong encryption methods.

Network management technologies (Cont.)  SNMP network management  SNMP supports three operations on devices: read, write and notify.  The management console can read and modify the variables stored on a device and issue notifications of special events.

Network management technologies (Cont.)  OSI, TMN and others  The International Telecommunications Union (ITU) has defined the Telecommunications Management Network (TMN) standards for managing telecommunications networks.  It is an alternative scheme designed for telecommunications networks and has a strong relationship with the OSI Management Model known as the Common Management Information Protocol (CMIP).  The ISO 7498 Open System Interconnect (OSI) Model consists of a large number of documents describing different aspects of network communication and management

Network management technologies (Cont.)  Amongst these is the basic conceptual model for management of networked computers. It consists of these issues:  Configuration management  Fault management  Performance management  Security management  Accounting management

Network management technologies (Cont.)  Java Management Extension (JMX)  Java Management Extension (JMX) is Java’s answer to dealing with managed objects.  The basic idea of JMX is not very different to that of SNMP, but the transport mechanisms are integrated into Java’s extensive middleware framework.

Network management technologies (Cont.)  Jini and UPnP: management-free networks  Jini is a Java derivative technology that is aimed at self-configuring ad hoc networks.  A similar project is Microsoft’s Universal Plug’n’Play (UPnP), a peer-to-peer initiative that uses existing standards like TCP/IP, HTTP and XML to perform a similar function.  The aim of these technologies is to eliminate the need for system administrators, by making devices configure themselves.

Creating infrastructure  With the explosion in numbers of hosts combined in networks, several authors have begun to address the problem of defining an infrastructure model which is stable, reproducible and robust to accidents and upgrades.  Until recently, little attention was given to analyzing methodologies for the construction of efficient and stable networks from the ground up.

Principles of stable infrastructure  Any model of system infrastructure must be able to scale efficiently to large numbers of hosts (and perhaps subnets, depending on the local netmask ).  A model which does not scale efficiently with numbers of hosts is likely to fail quickly.  Any model of system infrastructure must have reliability as one of its chief goals.  Down time can often be measured in real money.  Reliability is not just about the initial quality of hardware and software, but also about the need for preventative maintenance.  Reliability is safeguarded by redundancy, or backup services running in parallel

System maintenance models  Unix administrators have run background scripts to perform system checks and maintenance for many years. Such scripts run daily or hourly and make sure that each system is properly configured, perform garbage cleaning and report any serious problems to an administrator.  Windows can be both easier and harder to administrate than Unix. It can be easier because the centralized model of having a domain server running all the network services, means that all configuration information can be left in one place (on the server), and that each workstation can be made to configure itself from the server’s files.

System maintenance models (Cont.)  Several generalized approaches to the management of computers in a network have emerged.  Reboot  With the rapid expansion of networks, the number of local networks has outgrown the number of experienced technicians. The result is that there are many administrators who are not skilled in the systems they are forced to manage.  A disturbing but common belief, which originated in the 1980s microcomputer era, is that problems with a computer can be fixed by simply rebooting the operating system.  Rebooting a multi-user system is dangerous since users might be logged in from remote locations and could lose data and service.

System maintenance models (Cont.)  Manual administration  The default approach to system management is to allow qualified humans to do everything by hand.  This approach suffers from a lack of scalability.  When two manual administrators have a difference of opinion, there can be contention.

System maintenance models (Cont.)  Central control  Another approach to system administration is the use of control systems, in the manner of the star model.  Tivoli, HP OpenView and Sun Solstice are examples of these.  A process on each host reports errors as they occur to the administrator.  In this way the administrator has an overview of every problem on the network from his/her single location and can either fix the problems by hand as they occur (if the system supports remote login), or distribute scripts.

System maintenance models (Cont.)  Immunology (self-maintenance)  A relatively new approach to system management which is growing in popularity is the idea of equipping networked operating systems with a simple immune system.  An immune system is the Fire, Police and Paramedic services as well as the garbage collection agencies.  In an immune system, every host is responsible for automatically repairing its own problems

Reference: Principles of Network and System Administration Second Edition Mark Burgess Oslo University College, Norway Chapter 6 Chapter 7