660 likes | 866 Views
Network Management. Chapter 18. Objectives. Describe how configuration management documentation enables you to manage and upgrade a network efficiently Conduct network monitoring to identify performance and connectivity issues Explain how to optimize network performance. Overview.
E N D
Network Management Chapter 18
Objectives Describe how configuration management documentation enables you to manage and upgrade a network efficiently Conduct network monitoring to identify performance and connectivity issues Explain how to optimize network performance
Introduction to Network Management • Complicated networks are vulnerable • Configuration management is necessary • Configuration management prevents problems when upgrading
Three Parts to Chapter 18 • Network Configuration Management • Monitoring Performance and Connectivity • Network Performance Optimization
Network Configuration Management • Configuration Management Documentation • Wiring Schematics or Diagrams
Configuration Management Documentation • Wiring diagrams • Network diagrams • Baselines • Policies, procedures, and configurations • Regulations
Wiring Schematics or Diagrams • Wiring diagram/wiring schematic • How the wires connect to various switches, etc. • Wiring standards used (CAT53, 568A, fiber, etc.) • Every cable run, telecom closet, etc. • Cross-connects, demarcs, etc. • Telephone runs
Physical and Logical Network Diagrams • Information not included in wiring diagrams
Physical Network Diagram • Physical runs • Defines types of connections • Routers, switches, servers, CSU/DSU, etc. • Created by network administrator • Using standardized network topology icons • Using software utility like MS Visio
Logical Network Diagram • Broadcast domains (circles) • Internet connections (clouds) • Static IP addresses of significant systems • Only critical switches or routers
Baselines • Benchmark of when everything is working correctly • Commit to creating often and comparing • Log of performance indicators • CPU usage • Network utilization • Other performance measurements • Windows Performance Monitor
Policies • Acceptable use policy • What people can and cannot do with network hardware and software • User training • Security policy • Level of access for employees • Password complexity and much more
Procedures • What to do • When upgrading components • When adding new user accounts
Configurations • How software should be configured • How hardware should be configured • Results of the procedures
Regulations • Rules governing behavior in the workplace • How to keep network and people safe and productive • Included in configuration management documentation
Change Management Documentation • CompTIA separates detailed overview of network from how to upgrade it • Normally these are combined into the change management documentation • Consult documentation before major changes
Monitoring Performance and Connectivity
Monitoring Tasks • Create baselines • Ongoing monitoring • Various logs
Monitoring Tools • Windows Performance Monitor (PerfMon) • Monitors behavior of hardware and software • Monitors locally or remotely
Configuring Performance Monitor • Object • System Components • CPU, memory, disk drives, etc. • Counter • A measurable feature of an object • Views • A variety of ways of presenting information • Real-time or logged
Configuring Performance Monitor • Add counters and objects • For logging, must add entire object • Monitor local or remote computer • Save log files for a snapshot of a point in time
Create multiple baselines • System at rest • System in use • Revisit and monitor changes to baseline
Third-party network monitoring tools • Often expensive • Generate baselines • Monitor in real-time • Alert administrator to problems • Can act as intrusion detection systems (IDS) • Example: IPSentry by RGE, Inc.
More about logs • Every OS generates logs • Three types (Windows examples) • Application logs • Security logs • System logs
Log Viewers • Windows Event Viewer • Linux stores logs in /VAR/LOG • Use text editor to view • Mac OSX GUI viewer called Console
Overview • Network admin keeps network running • Users notice problems quickly • CompTIA Network+ requirements • Caching • Controlling data throughput • Keeping resources available
Caching • Storing requested data in hopes it will be needed again [in the short term] • Works in many ways on a network • Reduces network workload
Controlling Data Throughput • Most networks have limited bandwidth • Growing use • It will eventually get slower • Latency-sensitive applications need consistent bandwidth • Apps like streaming video require high bandwidth
Methods for Controlling Data Throughput • Throttling bandwidth • Quality of Service (QoS) • Priority to certain ports • Layer 2 of the OSI model • Traffic Shaping (a.k.a. bandwidth shaping) • Priority by TCP/UDP port number • Layers 3 and 7 of the OSI model