• Network+ Guide to Networks6th Edition• Chapter 15• Network Management• Objectives• Explain basic concepts related to network management• Discuss the importance of documentation, baseline measurements, policies, and regulations in assessing and maintaining a network’s health• Manage a network’s performance using SNMP-based network management software, system and event logs, and traffic-shaping techniques• Objectives (cont’d.)• Identify the reasons for and elements of an asset management system• Plan and follow regular hardware and software maintenance routines• Fundamentals of Network Management• Network management– Assess, monitor, and maintain all network aspects– Scope differs according to network’s size and importance– Several network management disciplines– All share same goals• Enhance efficiency and performance• Prevent costly downtime and loss– Predict problems before they occur• Documentation• Network aspects to document– Physical topology– Access method– Protocols– Devices– Operating systems– Applications– Configurations• Documentation (cont’d.)• Configuration management– Collection, storage, assessment of configuration documentation• Documenting all network aspects– Saves future work• Network diagrams– Graphical representations of network’s devices, connections– Use popular Cisco icons– Provide broad snapshot of network’s physical or logical topology• Documentation (cont’d.)• Wiring schematic– Graphical representation of network’s wired infrastructure– Detailed form• Includes every wire connecting network devices– Less detailed form• Single line represents group of wires connecting several clients to a switch• Baseline Measurements• Baseline– Report of network’s current operation state• Example baseline measurements– Network backbone utilization rate– Number of users logged on per day or per hour– Number of protocols running on network– Error statistics• Runts, collisions, jabbers, giants– Frequency of application use– Bandwidth usage• Baseline Measurements (cont’d.)• Compare future and past performance– Most critical network, user functions– More data provides more accuracy• Forecasting network traffic patterns– Difficult to predict users’ habits, new technology effects, changes in resource demand• Gathering baseline data– Software applications• Freeware• Expensive, customizable hardware and software– Determine use before selecting• Policies, Procedures, and Regulations• Rules limit chaos, confusion, downtime• Sound network management policies– Media installation and management– Network addressing policies– Security-related policies– Troubleshooting procedures– Backup and disaster recovery procedures• Policies, Procedures, and Regulations (cont’d.)• State and federal regulations– CALEA (Communications Assistance for Law Enforcement Act)• Telecommunications carriers, equipment manufacturers must provide for surveillance capabilities– HIPAA (Health Insurance Portability and Accountability Act)• Protect medical records security and privacy• Many policies and procedures– Not laws– Best practices to prevent network problems• Fault and Performance Management• Assess network’s status on an ongoing basis• Performance management– Monitor links and devices’ ability to keep up with demand• Fault management– Detection and signaling of device, link, component faults• Network Management Systems• Enterprise-wide network management systems– Accomplish fault and performance management– All use similar architecture– Polling• Collecting data from multiple networked devices at regular intervals– Agent• Software routine• Collects information about device’s operation• Provides information to network management application• Network Management Software (cont’d.)• Various aspects of a device can be managed– Processor, memory, hard disk, NIC, and intangibles• MIB (Management Information Base)– Contains managed devices definition, data• SNMP (Simple Network Management Protocol)– Used to communicate managed device information– Part of TCP/IP suite– SNMPv3: most secure version of the protocol– SNMPv2 still widely used• Network Management Software (cont’d.)• Several ways to view and analyze data• Network management applications– Flexible– Challenging to configure and fine-tune– Choose correct type and amount of information to collect• Faults can trigger alarms– Also recorded in system and event logs• System and Event Logs• Log– Contains recorded conditions recognized by operating system• Event log– Windows-based computer log containing monitored device information• Event Viewer application– Application to view log information in Windows• System and Event Logs (cont’d.)• Syslog function– Standard for generating, storing, and processing messages about events on Linux or UNIX– Data written to system log• Using logs for fault management– Logs keep history– Information collected does not point to problem– Logs must be monitored for errors– Application used for viewing, filtering information• Traffic Shaping• Traffic shaping– Manipulating packet, data stream, and connection characteristics• Manage type and amount of traffic traversing network – Goals• Assure timely delivery of most important traffic• Offer best possible performance for all users• Traffic Shaping (cont’d.)• Techniques– Delay less important traffic– Increase priority of more important traffic– Traffic policing• Limit traffic volume flowing in and out of interface during specified time period• Limit momentary throughput rate for an interface• Not without controversy– Comcast discriminated against certain traffic types• Traffic Shaping (cont’d.)• Traffic prioritization– Treating more important traffic preferentially• Prioritization based on characteristics– Protocol– IP address– User group– DiffServ (Differentiated Services) flag or TOS (type of service) field in IP datagram– VLAN tag in Data Link layer frame– Service or application• Caching• Caching– Local storage of frequently needed files– Allows quick access• Web caching– Most common caching type, highly customizable– Web pages stored locally• On host or network, and then delivered to requesters• ISP cache engine– Network device devoted to storage, frequently requested file delivery– Saves money; lowers WAN traffic• Asset Management• Identifying and tracking hardware and software• First step– Inventory each network node• Organization needs– Determine appropriate asset management tool• Benefits– Simplifies maintaining and upgrading network– Provides information about hardware and software costs and benefits• Change Management• Managing change while maintaining network efficiency and availability: – Requires good planning• Common software and hardware changes– Range from installing patches to replacing network backbone
• Several ways to approach changes
• Software Changes
• Software upgrades
– Important for keeping system running optimally
• Application patches and upgrades
– Correction, improvements, and enhancements to particular software application
– Change only part of an application
• General steps
– Determine whether patch or upgrade is necessary
– Research change purpose, compatibility, and effects
– Determine whether changes should apply to all users
– Determine distribution method
• Software Changes (cont’d.)
• General steps (cont’d.)
– Notify appropriate personnel of intent to change
– Back up current system
– Prevent users from accessing system during change
– Keep instructions handy as you install revision
– Implement the change
– Test system fully
– Re-enable access to the system
• Or revert to previous version
– Inform personnel that change is complete
– Record change in the change management system
• Software Changes (cont’d.)
• NOS (Network Operating System) upgrades
– Most critical upgrade type
– Involves significant and potentially drastic changes to the way servers and clients operate
– Upgrade requires forethought, product research, and rigorous testing
– Ask and answer significant questions
– Create a project plan
– Complex, far-reaching change
– Ensure appropriate budget, resources, and time
• Software Changes (cont’d.)
• Steps in NOS upgrade
– Research
– Project plan
– Proposal
– Evaluation
– Testing
– Training
– Preimplementation
– Implementation
– Postimplementation
• Software Changes (cont’d.)
• Reversing a software upgrade
– Software change may create unexpected problems
– Be prepared to reverse an upgrade
• Backleveling
– Reverting to previous version of software after attempting upgrade
– No hard-and-fast rules for backleveling
– Always refer to software vendor’s documentation to reverse an upgrade
• For NOS: consult other professionals as well
• Hardware and Physical Plant Changes
• Required when network component fails or malfunctions
• More commonly performed as upgrade
– Increase capacity, improve performance, and add network functionality
• Face same issues as software changes
– Proper planning is key
– Follow steps on Pages 712-713 of text
• Hardware and Physical Plant Changes (cont’d.)
• Adding or upgrading equipment
– Difficulty determined by past use; experience with hardware or vendor
– Take time to research, evaluate, and test unfamiliar equipment
– Rapid hardware industry changes
• May affect consistency of installed products
– If consistency is a concern
• Purchase as much hardware as possible in single order
• Purchase from same vendor
• Hardware and Physical Plant Changes (cont’d.)
• Adding or upgrading equipment (cont’d.)
– Different preparation and implementation requirements for each device type
đang được dịch, vui lòng đợi..
