1 / 37

Lecture 8: Network & System Management

Lecture 8: Network & System Management. By: Adal ALashban. What is Network Management?. Goal: To ensure that the users of a network receive the IT services with the quality of service ( QoS ) that they expect.

mgerke
Télécharger la présentation

Lecture 8: Network & System Management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Lecture 8: Network & System Management By: Adal ALashban

  2. What is Network Management? • Goal: • To ensure that the users of a network receive the IT services with the quality of service (QoS) that they expect. • - Network management includes the deployment, integration and coordination of the hardware, software, and human elements to monitor, test, configure, analyze, evaluate, and control the network and element resources to meet the • real-time, operational performance, and Quality of Service requirements at a reasonable cost.

  3. Top-Down View of NM Functions

  4. NM Functional Requirements Fault Management detection, isolation and correction of abnormal operations. 2. Configuration Management identify managed resources and their connectivity, discovery. 3. Accounting Management keep track of usage for charging. 4. Performance Management monitor and evaluate the behavior of managed resources. 5. Security Management allow only authorized access and control. FCAPS

  5. 1. Fault Management • Manages network problems to keep the network running reliably and efficiently.. • Fault management process involves the following steps: • Detecting the problem symptoms. • Isolating the problem. • Fixing the problem automatically (if possible) or manually. • Logging the detection and resolution of the problem.

  6. 2. Configuration Management • Configuration Management monitors network and system configuration information and stores it in a configuration management database. • The maintenance of this database allows network administrators to track hardware, software, and other network resources.

  7. 2. Configuration Management (cont.) • Each network device has a variety of information associated with it: • Software version information for the operating system, protocol software, or management software. • Hardware version information for the interfaces or hardware controllers. • Contact information indicating who to contact if problems with the device arise. • Location information indicating the physical location of the device.

  8. 2. Configuration Management (cont.) • CM Information Associated with a Managed Device.

  9. 3. Accounting Management • Measures network utilization parameters in order to regulate individual and group uses of the network. • Minimizes network problems and maximizes fairness of user access to the network because network resources can be portioned based on network capacity and user needs.

  10. 4. Performance Management • Maintains internetwork performance at acceptable levels by measuring and managing various network performance variables. • Performance variables include network throughput, user response times, line utilization, and others. • Performance management involves three basic steps: • Gathering data relating to key performance variables. • Analyzing data to determine the normal (baseline) performance levels. • Determining appropriate performance levels for each variable so that exceeding these levels indicates a network problem worthy of attention.

  11. Performance Console Window Help Action View Favorites Tree Favorites Console Root System Monitor Performance Logs and Alerts 100 80 60 40 20 10 Last 3.000 Average 16.154 2.000 Minimum Maximum 63.000 Duration 1:40 Color Scale Counter Instance Parent Object Computer - - - - - - - - - - - - - - - 1.000 1.000 1.000 1.000 1.000 % Processor Time % Processor Time % Disk Time Page/sec Bytes Received/sec _Total explorer 0 C: D: - - - Default FTP Site Processor Process PhysicalDisk Memory FTP Service \\LONDON \\LONDON \\LONDON \\LONDON \\LONDON 4. Performance Management (cont.)

  12. 4. Performance Management (cont.) • Reactive: • When performance becomes unacceptable (that is, a user-defined threshold is exceeded), the managed device reacts by sending an alert to the network management system (NMS). • Reactive PM Components: • The management entity continually monitors performance variables in managed devices. • When a particular performance threshold is exceeded, the NMS or the managed device detects the problem. • If the managed device detects the problem, it generates an alert and sends it to the NMS. • The NMS takes an appropriate action, such as alerting the network administrator.

  13. 4. Performance Management (cont.) • Proactive: • Simulation is used to project how network growth will affect performance metrics. These simulations alert administrators to impending problems before they affect network users.

  14. Windows Task Manager Windows Task Manager Windows Task Manager File Options View Windows Help File Options View Help File Options View Help Applications Applications Applications Processes Processes Processes Performance Performance Performance CPU Usage CPU Usage History Image Name PID Task Status CPU CPU Time Mem Usage Building Schematic - Paint Memo to Supervisor - WordPad Calculator My Computer Running Running Running Running System Idle Process System smss.exe csrss.exe winlogon.exe services.exe lsass .exe svchost .exe spoolsv .exe mspaint .exe msdtc .exe inojobsv .exe dfssvc .exe svchost .exe ismserv .exe llssrv .exe ntfrs.exe regsvc.exe 0 8 168 196 220 148 160 472 492 624 704 808 824 840 864 880 928 968 96 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 4:52:37 0:00:27 0:00:00 0:00:20 0:00:09 0:00:14 0:00:32 0:00:00 0:00:00 0:00:04 0:00:00 0:07:46 0:00:00 0:00:00 0:00:00 0:00:01 0:00:09 0:00:00 16 K 212 K 344 K 1,820 K 4,408 K 8,228 K 15,768 K 2,648 K 4,184 K 352 K 3,428 K 5,704 K 2,336 K 3,416 K 5,348 K 3,860 K 1,108 K 844 K 3% MEM Usage Memory Usage History 10 1600K Physical Memory (K) Totals Handles Threads Processes 5932 381 30 Total Available System Cache 130612 27740 50704 Kernel Memory (K) Commit Charge (K) Total Limit Peak 101600 310892 116896 Total Paged Nonpaged 22804 15704 7100 Show processes from all users End Process End Task Switch To New Task... CPU Usage: 2% Mem Usage: 103500K / 310892K Processes: 30 CPU Usage: 6% Processes: 30 CPU Usage: 3% Mem Usage: 101600K / 310892K Mem Usage: 103452K / 310892K Processes: 30 Windows Task Manager

  15. 5. Security Management • Access control: • Controls access to network resources, and prevents network sabotage (intentional or unintentional) and unauthorized access to sensitive information. • Aids administrators in creating a secure network environment. This includes: • partitioning network resources into authorized and unauthorized areas, • mapping groups of users to those areas, and monitoring, policing, and logging user access to resources in those areas. • Security monitoring: • Security event collection. • Event analysis, correlation and alert generation. • Alert handling.

  16. Network Management Systems - A network management system (NMS) is a collection of tools for network monitoring and control based on the manager-agent paradigm. - NMS typically provides a GUI through which most or all management tasks can be performed. - Many commercial and freely available NMSs exist: 1. Commercial: HP OpenView, IBM NetView, Sun Net Manager, Cisco works and etc. 2. Open source: OpenNMS , Nagios and etc.

  17. Standard Management Frameworks 1. Internet Network Management Framework (IETF) SNMPv1 SNMPv2 SNMPv3 2. OSI Network Management Framework (ISO/ITU-T) CMIP (X.700 Series) 3. Telecommunication Management Network (ITU-T) TMN (M.3000 Series)

  18. Standard Management Frameworks (cont.) 4. Distributed Management Task Force (DMTF) DMI, CIM, WBEM 5. TeleManagement Forum MTNM, eTOM, and etc.

  19. Lecture 9: Introduction to Cloud OS & Computing By: Adal ALashban

  20. What is Cloud Computing? - Cloud Computing is a general term used to describe a new class of network based computing that takes place over the Internet. - A collection/group of integrated and networked hardware, software and Internet infrastructure (called a platform). - Using the Internet for communication and transport provides hardware, software and networking services to clients. - These platforms hide the complexity and details of the underlying infrastructure from users and applications by providing very simple graphical interface or API (Applications Programming Interface).

  21. What is Cloud Computing? - In addition, the platform provides on demand services, that are always on, anywhere, anytime and any place. - Pay for use and as needed, elastic scale up and down in capacity and functionalities. - The hardware and software services are available to general public, enterprises, corporations and businesses markets.

  22. What is Cloud Computing? - Shared pool of configurable computing resources. - On-demand network access. - Provisioned by the Service Provider.

  23. Cloud Summary - Cloud computing is an umbrella term used to refer to Internet based development and services. - A number of characteristics define cloud data, applications services and infrastructure: Remotely hosted: Services or data are hosted on remote infrastructure. Ubiquitous: Services or data are available from anywhere. Commoditized: The result is a utility computing model similar to traditional that of traditional utilities.

  24. Cloud Service Models and layers

  25. Software as a Service (SaaS) - SaaS is a model of software deployment where an application is hosted as a service provided to customers across the Internet. The benefits of SaaS You can sign up and rapidly start using innovative business apps Apps and data are accessible from any connected computer No data is lost if your computer breaks, as data is in the cloud The service is able to dynamically scale to usage needs

  26. Platform as a service (PaaS) • Platform as a service provides a cloud-based environment with everything required to support the complete lifecycle of building and delivering web-based (cloud) applications — without the cost and complexity of buying and managing the underlying hardware, software, provisioning, and hosting. • The benefits of PaaS • Develop applications and get to market faster • Deploy new web applications to the cloud in minutes • Reduce complexity with middleware as a service Created By Dr.Najla AlNabhan edited by Maysoon AlDuwais

  27. Infrastructure as a service (IaaS) • Infrastructure as a service provides companies with computing resources including servers, networking, storage, and data center space on a pay-per-use basis. • The benefits of IaaS • No need to invest in your own hardware • Infrastructure scales on demand to support dynamic workloads • Flexible, innovative services available on demand Created By Dr.Najla AlNabhan edited by Maysoon AlDuwais

  28. Advantages of Cloud Computing • Lower computer costs: • You do not need a high-powered and high-priced computer to run cloud computing web-based applications. • Improved performance: • With few large programs hogging your computer's memory, you will see better performance from your PC. • Reduced software costs: • Instead of purchasing expensive software applications, you can get most of what you need for free-ish!

  29. Advantages of Cloud Computing • Instant software updates: • Another advantage to cloud computing is that you are no longer faced with choosing between obsolete software and high upgrade costs. • Improved document format compatibility: • You do not have to worry about the documents you create on your machine being compatible with other users' applications or Oses. • Unlimited storage capacity: • Cloud computing offers virtually limitless storage.

  30. Advantages of Cloud Computing • Increased data reliability: • Unlike desktop computing, in which if a hard disk crashes and destroy all your valuable data, a computer crashing in the cloud should not affect the storage of your data. • Universal document access: • That is not a problem with cloud computing, because you do not take your documents with you. • Latest version availability: • When you edit a document at home, that edited version is what you see when you access the document at work.

  31. Advantages of Cloud Computing • Easier group collaboration: • Sharing documents leads directly to better collaboration. • Many users do this as it is an important advantages of cloud computing. • Device independence: • You are no longer tethered to a single computer or network. • Changes to computers, applications and documents follow you through the cloud. • Move to a portable device, and your applications and documents are still available. • .

  32. Disadvantages of Cloud Computing • Requires a constant Internet connection: • Cloud computing is impossible if you cannot connect to the Internet. • A dead Internet connection means no work and in areas where Internet connections are few or inherently unreliable, this could be a deal-breaker. • Does not work well with low-speed connections: • Similarly, a low-speed Internet connection, such as that found with dial-up services, makes cloud computing painful at best and often impossible.

  33. Disadvantages of Cloud Computing • Can be slow: • Even with a fast connection, web-based applications can sometimes be slower than accessing a similar software program on your desktop PC. • Stored data might not be secure: • With cloud computing, all your data is stored on the cloud. • Stored data can be lost: • Theoretically, data stored in the cloud is safe, replicated across multiple machines. • But on the off chance that your data goes missing, you have no physical or local backup.

  34. Virtualization • - Virtual workspaces: • An abstraction of an execution environment that can be made dynamically available to authorized clients by using well-defined protocols. • Resource quota (e.g. CPU, memory share). • Software configuration (e.g. O/S, provided services). • -

  35. Virtual Machines - VM technology allows multiple virtual machines to run on a single physical machine.. Performance: Para-virtualization (e.g. Xen) is very close to raw physical performance!

  36. Advantages of Virtual Machines • Run operating systems where the physical hardware is unavailable. • Easier to create new machines, backup machines, etc. • Emulate more machines than are physically available. • Timeshare lightly loaded systems on one host. • Debug problems (suspend and resume the problem machine). • Easy migration of virtual machines (shutdown needed or not).

  37. Thank You

More Related