130 likes | 237 Views
Cisco S3C8. Network Management. Documentation. diagrams that indicate the path of the physical wiring layout; the type of cable; the length of each cable; the type of termination for the cable; physical location of each wall plate or patch panel, and; a labeling scheme for easy
E N D
Cisco S3C8 Network Management
Documentation • diagrams that indicate the path of the physical wiring layout; • the type of cable; • the length of each cable; • the type of termination for the cable; physical location of each wall plate or patch panel, and; • a labeling scheme for easy • identification of each wire.
Documentation • Also includes: • Layout of MDF • Layout of IDF • Physical layout of rack mounts • Auxiliary equipment & servers • Patch panel labels • Identification and configuration of all equipment in MDF and IDF
Documentation • Also includes: • Server and workstation configuration details • Physical location • User • Network ID – IP address, MAC address • Subnet, Topology; IRQ, SMA • Software installed • O/S • Repair Record
Documentation / Security • Soft • User rights, password, firewall support • Hard • Locking MDFs and IDJs • Who has access to MDF and IDF • How hosts are protected • Who has physical access to system • Documentation needs to be updated
Data Recovery • UPS, Tape Backup, and Disk Arrays • Full, incremental, differential, copy and daily • Tape backup is cheap • Sequential Storage • Archive Bit • Allows for INCREMENTAL backup • Only backup what has changed since last backup date
Disk Redundancy • Raid 0 stripes data across multiple disks, no parity • Raid 1 disk mirroring – disk duplexing – writes data to two identical partitions • Raid 2 writes across multiple disks with error checking • Raid 3 stripes data one byte at a time- dedicated parity drive • Raid 4 stripes one sector at a time- dedicated parity drive • Raid 5 stripes data and parity across multiple disks
Environmental Factors • Static • Contaminants – smoke, dust and dirt • Heat – high temperatures • Protection • Isolate transformers; use regulators and line conditions and UPS
Viruses • Worm propagates itself • Virus infects files • Trojan disguised as a game, utility or application • Know where software came from • Don’t use unknown disks • Use current virus checker
Network Types • Peer-to-peer • Workgroup network • Small number of workstations • W95 W98 Lantastic • 10 workstations • Client Server • Controlled by a NOS (Network Operating System • Unix • NFS security , multitasking, kernel, supports many users
Network Control • User rights • Account numbers • Passwords • Access
Baseline Measurements • Bandwidth used • Collisions • Broadcast traffic
Scientific Method – Trouble Shooting • 1. Identify network/user problem. • 2. Gather data about network/user problem. • 3. Analyze data to come up with a possible solution to the problem. • 4. Implement solution to network to attempt correction to the system. • 5. If the problem isn't resolved, undo previous changes and modify data. • 6. Go to step 3