1 / 64

Network Management

Network Management. Chapter 18. Objectives. Describe how configuration management documentation enables you to manage and upgrade a network efficiently Conduct network monitoring to identify performance and connectivity issues Explain how to optimize network performance. Overview.

mauli
Télécharger la présentation

Network Management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Network Management Chapter 18

  2. Objectives Describe how configuration management documentation enables you to manage and upgrade a network efficiently Conduct network monitoring to identify performance and connectivity issues Explain how to optimize network performance

  3. Overview

  4. Introduction to Network Management • Complicated networks are vulnerable • Configuration management is necessary • Configuration management prevents problems when upgrading

  5. Three Parts to Chapter 18 • Network Configuration Management • Monitoring Performance and Connectivity • Network Performance Optimization

  6. Network Configuration Management

  7. Network Configuration Management • Configuration Management Documentation • Wiring Schematics or Diagrams

  8. Configuration Management Documentation • Wiring diagrams • Network diagrams • Baselines • Policies, procedures, and configurations • Regulations

  9. Wiring Schematics or Diagrams • Wiring diagram/wiring schematic • How the wires connect to various switches, etc. • Wiring standards used (CAT53, 568A, fiber, etc.) • Every cable run, telecom closet, etc. • Cross-connects, demarcs, etc. • Telephone runs

  10. Figure 18.1 Wiring diagram overview

  11. Figure 18.2 Wiring diagram detail

  12. Physical and Logical Network Diagrams • Information not included in wiring diagrams

  13. Physical Network Diagram • Physical runs • Defines types of connections • Routers, switches, servers, CSU/DSU, etc. • Created by network administrator • Using standardized network topology icons • Using software utility like MS Visio

  14. Figure 18.3 Physical network diagram

  15. Figure 18.4 Sample network topology icons

  16. Figure 18.5 Visio in action

  17. Logical Network Diagram • Broadcast domains (circles) • Internet connections (clouds) • Static IP addresses of significant systems • Only critical switches or routers

  18. Figure 18.6 Logical network diagram

  19. Baselines • Benchmark of when everything is working correctly • Commit to creating often and comparing • Log of performance indicators • CPU usage • Network utilization • Other performance measurements • Windows Performance Monitor

  20. Policies • Acceptable use policy • What people can and cannot do with network hardware and software • User training • Security policy • Level of access for employees • Password complexity and much more

  21. Procedures • What to do • When upgrading components • When adding new user accounts

  22. Configurations • How software should be configured • How hardware should be configured • Results of the procedures

  23. Figure 18.7 Section of SHOW CONFIG

  24. Regulations • Rules governing behavior in the workplace • How to keep network and people safe and productive • Included in configuration management documentation

  25. Change Management Documentation • CompTIA separates detailed overview of network from how to upgrade it • Normally these are combined into the change management documentation • Consult documentation before major changes

  26. Monitoring Performance and Connectivity

  27. Monitoring Tasks • Create baselines • Ongoing monitoring • Various logs

  28. Monitoring Tools • Windows Performance Monitor (PerfMon) • Monitors behavior of hardware and software • Monitors locally or remotely

  29. Configuring Performance Monitor • Object • System Components • CPU, memory, disk drives, etc. • Counter • A measurable feature of an object • Views • A variety of ways of presenting information • Real-time or logged

  30. Configuring Performance Monitor • Add counters and objects • For logging, must add entire object • Monitor local or remote computer • Save log files for a snapshot of a point in time

  31. Figure 18.8 Performance Monitor in action

  32. Figure 18.9 Monitoring a remote computer

  33. Figure 18.10 Selecting performance objects

  34. Figure 18.11 Logging data

  35. Figure 18.12 Selecting a log file

  36. Figure 18.13 Replaying a log file

  37. Create multiple baselines • System at rest • System in use • Revisit and monitor changes to baseline

  38. Third-party network monitoring tools • Often expensive • Generate baselines • Monitor in real-time • Alert administrator to problems • Can act as intrusion detection systems (IDS) • Example: IPSentry by RGE, Inc.

  39. Figure 18.14 IPSentry at work

  40. More about logs • Every OS generates logs • Three types (Windows examples) • Application logs • Security logs • System logs

  41. Log Viewers • Windows Event Viewer • Linux stores logs in /VAR/LOG • Use text editor to view • Mac OSX GUI viewer called Console

  42. Figure 18.15 Event Viewer in Windows Vista

  43. Network Performance Optimization

  44. Overview • Network admin keeps network running • Users notice problems quickly • CompTIA Network+ requirements • Caching • Controlling data throughput • Keeping resources available

  45. Caching • Storing requested data in hopes it will be needed again [in the short term] • Works in many ways on a network • Reduces network workload

  46. Figure 18.16 Pausing a video on YouTube

  47. Figure 18.17 Hulu.com (I love this site!)

  48. Controlling Data Throughput • Most networks have limited bandwidth • Growing use • It will eventually get slower • Latency-sensitive applications need consistent bandwidth • Apps like streaming video require high bandwidth

  49. Methods for Controlling Data Throughput • Throttling bandwidth • Quality of Service (QoS) • Priority to certain ports • Layer 2 of the OSI model • Traffic Shaping (a.k.a. bandwidth shaping) • Priority by TCP/UDP port number • Layers 3 and 7 of the OSI model

  50. Figure 18.18 Traffic shaping on a SOHO router

More Related