UNIT 6 SEMINAR Unit 6 Chapter 7 and 8, plus Lab 12 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours:

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Natting NATTING. Private vs Public IP Addresses Whatever connects directly into Internet must have public (globally unique) IP address There is a shortage.
Multi Protocol Label Switching Allot and MPLS Multi Protocol Label Switching MPLS Smart, fast routing mechanism to solve routing table scalability issues.
Chapter 19: Network Management Business Data Communications, 4e.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Unit 7 Chapter 9, plus Lab 11 Course Name – IT Network Design
Network Design and Implementation IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
EHealth Network Monitoring Network Tool Presentation J. Gaston Senior Network Design Seminar Professor Morteza Anvari 10 December 2004.
Guide to TCP/IP, Third Edition Chapter 11: Monitoring and Managing IP Networks.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
1/28/2010 Network Plus Unit 5 Section 2 Network Management.
Barracuda Load Balancer Server Availability and Scalability.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
Mobile Networking Challenges1 5.6 Mobile Ad Hoc Networks  Ad hoc network does not have any preexisting centralized server nodes to perform packet routing,
Real Time Monitors, Inc. Switch Expert™. 2 Switch Expert™ Overview Switch Expert ™ (SE) currently deployed at 80% percent of the INSIGHT-100.
UNIT 5 SEMINAR Unit 5 Chapter 6, plus Lab 10 for next week Course Name – IT482 Network Design Instructor – David Roberts Contact Information:
Management for IP-based Applications Mike Fisher BTexaCT Research
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNP 1 v3.0 Module 1 Overview of Scalable Internetworks.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Network management Chapter2 Author: J. Richard Burke Presented by Lin Ming Yuan IM graduate r
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public Course v6 Chapter # 1 Chapter 2: Troubleshooting Processes for Complex Enterprise.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Network Management Mechanisms Two major network management protocols: Simple Network Management Protocol (SNMP) Common Management Information Protocol.
Slide 1 2/22/2016 Policy-Based Management With SNMP SNMPCONF Working Group - Interim Meeting May 2000 Jon Saperia.
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
Company LOGO Network Architecture By Dr. Shadi Masadeh 1.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
UNIT 6 SEMINAR Unit 5 Chapter 7 and 8, plus Lab 10 Course Name – IT Network Design Instructor – Jan McDanolds, MS, Security+ Contact Information:
UNIT 8 SEMINAR Unit 8 Chapter 10, plus Lab 12 Course Name – IT Network Design Instructor – Jan McDanolds, MS, Security+ Contact Information: AIM.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
UNIT 7 SEMINAR Unit 7 Chapter 9, plus Lab 13 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours: Tuesday.
PART1 Data collection methodology and NM paradigms 1.
Software Defined Networking BY RAVI NAMBOORI. Overview  Origins of SDN.  What is SDN ?  Original Definition of SDN.  What = Why We need SDN ?  Conclusion.
Instructor Materials Chapter 7: EIGRP Tuning and Troubleshooting
CompTIA Security+ Study Guide (SY0-401)
Chapter 19: Network Management
Module 3: Enabling Access to Internet Resources
Redcell™ Management Essentials, Juniper Networks Enterprise Edition
Lec 5: SNMP Network Management
Potential Areas of Research Activity – March 2000
Security Methods and Practice CET4884
Securing the Network Perimeter with ISA 2004
Living in a Network Centric World
CCNA Network Fundamentals
Living in a Network Centric World
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
CompTIA Security+ Study Guide (SY0-401)
Chapter 1 Data Communications and NM Overview 1-1 Chapter 1
Living in a Network Centric World
Living in a Network Centric World
CT 1306 Communication Networks Management Lab
Living in a Network Centric World
Living in a Network Centric World
Chapter 10: Advanced Cisco Adaptive Security Appliance
Living in a Network Centric World
Living in a Network Centric World
Scrumium NetBrain Thursday, May 09, 2019.
Living in a Network Centric World
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Living in a Network Centric World
Presentation transcript:

UNIT 6 SEMINAR Unit 6 Chapter 7 and 8, plus Lab 12 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours: Tuesday 9:00 PM ET and Thursday 11:00 PM ET

UNIT 5 REVIEW Covered last week in Seminar Chapter 6 Addressing and Routing Architecture Addressing Fundamentals Routing Fundamentals Addressing Mechanisms Classful Addressing, Subnetting, Variable-Length Subnetting (VLSM), Supernetting, Private IP Addressing and Network Address Translation (NAT) Routing Fundamentals Establishing routing flows, Identifying and Classifying Routing Boundaries and Manipulating Routing Flows Addressing Strategies Routing Strategies Architectural Considerations Internal and External Relationships

UNIT 6 - CHAPTER 7 Network Management Architecture Network Management – a set of functions to control, plan, allocate, deploy, coordinate, and monitor network resources. Multiple layers: Business Management, Service Management, Network Management, Element Management, Network-Element Management Areas addressed: What NM protocol to use, will asset management be used, will monitoring take place from a single location, will testing be required for service-provider compliance, etc.

UNIT 6 - CHAPTER 7 NM Divided into Two Basic Functions I.The transport of management information across the system II.The management of NM information elements. Managing Elements and Transporting Management Data

UNIT 6 - CHAPTER 7 Four Categories of NM Tasks Monitoring for event notification Monitoring for trend analysis and planning Configuration of network parameters Troubleshooting the network.

UNIT 6 - CHAPTER 7 Network Devices and Characteristics End-to-end characteristics – measured across multiple network devices in the path of one or more traffic flows Per-link/per-network and per-element characteristics – specific to the type of element or connection between elements being monitored

UNIT 6 - CHAPTER 7 Network Management Mechanisms Protocols – examples: simple network management protocol (SNMP) common management information protocol (CMIP) including CIMP over TCP/IP (CMOT) SNMP – commands get, get-next, set and trap MIBs – management information bases for SNMP SNMP – used in monitoring, instrumentation and configuration mechanisms

UNIT 6 - CHAPTER 7 Architectural Considerations FCAPS – Fault management, configuration management, accounting management, performance management and security management In-band management – when traffic flows for network management follow the same network paths as traffic flows as for users and their applications Out-of-band management – when different paths are provided for network management Centralized, distributed and hierarchical management Scaling network management traffic Checks and balances Managing network management data MIB selection Integration of OSS (operations support systems)

UNIT 6 - CHAPTER 8 Performance Architecture How user, application, device and (existing) network requirements for performance (capacity, delay, and RMA) will be met within the planned network A performance architecture is the set of performance mechanisms to configure, operate, manage, provision and account for resources in the network that support traffic flows.

UNIT 6 - CHAPTER 7 SNMP Monitors Spiceworks SNMP Network Management Tool Inventory of all your network devices & their details Create an accurate network map of your devices Use SNMPv3 to securely connect to network devices Receive alerts when printer ink or toner is getting low SNMP Monitoring With PRTG Network Monitor Test SNMP Monitoring for Free PRTG Network Monitor combines essential network diagnostic tools. Download either the freeware or the fully functional 30 day trial

UNIT 6 - CHAPTER 7 Solarwinds SolarWinds Standard Toolset - monitor & alert in real time on network availability & health with tools including Real-Time Interface Monitor, SNMP Real-Time Graph, & Advanced CPU Load.

UNIT 6 - CHAPTER 8 Developing Goals for Performance Are the performance mechanisms necessary? What are we going to solve, add or differentiate? Are performance mechanisms sufficient? Ex: Should we implement QoS? Does the customer (or our company) have the staff to maintain performance mechanisms?

UNIT 6 - CHAPTER 8 Performance Mechanisms Quality of Service (QoS) – determining, setting and acting upon priority levels of traffic flows – including MPLS, ToS, CIR Resource Control – prioritization, traffic management, scheduling and queuing Service-Level Agreements (SLAs) – formal contracts Policies – high-level statements or rules about network resource allocation

LAB 12 Lab 12 in Experiments Manual Firewalls and VPN Network Security and Virtual Private Networks The objective of this lab is to study the role of firewalls and VPNs in providing security to shared public networks.