1 / 13

Cisco S3C8

Cisco S3C8. Network Management. Documentation. diagrams that indicate the path of the physical wiring layout; the type of cable; the length of each cable; the type of termination for the cable; physical location of each wall plate or patch panel, and; a labeling scheme for easy

vicky
Download Presentation

Cisco S3C8

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cisco S3C8 Network Management

  2. Documentation • diagrams that indicate the path of the physical wiring layout; • the type of cable; • the length of each cable; • the type of termination for the cable; physical location of each wall plate or patch panel, and; • a labeling scheme for easy • identification of each wire.

  3. Documentation • Also includes: • Layout of MDF • Layout of IDF • Physical layout of rack mounts • Auxiliary equipment & servers • Patch panel labels • Identification and configuration of all equipment in MDF and IDF

  4. Documentation • Also includes: • Server and workstation configuration details • Physical location • User • Network ID – IP address, MAC address • Subnet, Topology; IRQ, SMA • Software installed • O/S • Repair Record

  5. Documentation / Security • Soft • User rights, password, firewall support • Hard • Locking MDFs and IDJs • Who has access to MDF and IDF • How hosts are protected • Who has physical access to system • Documentation needs to be updated

  6. Data Recovery • UPS, Tape Backup, and Disk Arrays • Full, incremental, differential, copy and daily • Tape backup is cheap • Sequential Storage • Archive Bit • Allows for INCREMENTAL backup • Only backup what has changed since last backup date

  7. Disk Redundancy • Raid 0 stripes data across multiple disks, no parity • Raid 1 disk mirroring – disk duplexing – writes data to two identical partitions • Raid 2 writes across multiple disks with error checking • Raid 3 stripes data one byte at a time- dedicated parity drive • Raid 4 stripes one sector at a time- dedicated parity drive • Raid 5 stripes data and parity across multiple disks

  8. Environmental Factors • Static • Contaminants – smoke, dust and dirt • Heat – high temperatures • Protection • Isolate transformers; use regulators and line conditions and UPS

  9. Viruses • Worm propagates itself • Virus infects files • Trojan disguised as a game, utility or application • Know where software came from • Don’t use unknown disks • Use current virus checker

  10. Network Types • Peer-to-peer • Workgroup network • Small number of workstations • W95 W98 Lantastic • 10 workstations • Client Server • Controlled by a NOS (Network Operating System • Unix • NFS security , multitasking, kernel, supports many users

  11. Network Control • User rights • Account numbers • Passwords • Access

  12. Baseline Measurements • Bandwidth used • Collisions • Broadcast traffic

  13. Scientific Method – Trouble Shooting • 1. Identify network/user problem. • 2. Gather data about network/user problem. • 3. Analyze data to come up with a possible solution to the problem. • 4. Implement solution to network to attempt correction to the system. • 5. If the problem isn't resolved, undo previous changes and modify data. • 6. Go to step 3

More Related