CTS2134 Introduction to Networking. Module 09: Network Management

Similar documents
1: Review Of Semester Provide an overview of encapsulation.

Cisco SRW208 8-Port 10/100 Ethernet Switch: WebView Cisco Small Business Managed Switches

Cisco Cisco Certified Network Associate (CCNA)

Chapter 2. Switch Concepts and Configuration. Part I

ET4254 Communications and Networking 1

Domain 4.0: Network Management

Switching & ARP Week 3

SOLO NETWORK (11) (21) (31) (41) (48) (51) (61)

Switched Ethernet Virtual LANs

N exam.72q N CompTIA Network+ Certification Exam

High School Graduation Years 2016, 2017 and 2018

SOLO NETWORK (11) (21) (31) (41) (48) (51) (61)

Cisco SRW Port Gigabit Switch: WebView Cisco Small Business Managed Switches

Cisco Small Business Managed Switches

Configuring EtherChannels and Layer 2 Trunk Failover

Local Area Network Overview

3. What could you use if you wanted to reduce unnecessary broadcast, multicast, and flooded unicast packets?

SOLO NETWORK (11) (21) (31) (41) (48) (51) (61)

Defining Networks with the OSI Model. Module 2

Cisco CCNA (ICND1, ICND2) Bootcamp

Hands-On Troubleshooting IPTV with WireShark

Traditional network management methods have typically

Introduction to Networking

New Product: Cisco Catalyst 2950 Series Fast Ethernet Desktop Switches

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Symbols INDEX > 12-14

CISCO EXAM QUESTIONS & ANSWERS

TSHOOT: Troubleshooting and Maintaining Cisco IP Networks

MiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.

Quality of Service Setup Guide (NB14 Series)

Cisco Exploration 3 Module 3 LAN Switching and Wireless Jim Johnston Class Notes September 9, 2008

Principles behind data link layer services

Configuring EtherChannels and Layer 2 Trunk Failover

SOLO NETWORK (11) (21) (31) (41) (48) (51) (61)

Overview of the ML-Series Card

Question 7: What are Asynchronous links?

King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2

Principles behind data link layer services:

Principles behind data link layer services:

Managed Ethernet Switch User s Manual

More on LANS. LAN Wiring, Interface

- Hubs vs. Switches vs. Routers -

6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay

Guide to Networking Essentials, 6 th Edition. Chapter 7: Network Hardware in Depth

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0)

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

The Applications and Gaming Tab - Port Range Forward

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Cisco Introduction to Cisco Networking Technologies Exam. Practice Test. Version

Interface The exit interface a packet will take when destined for a specific network.

Cisco SGE Port Gigabit Switch Cisco Small Business Managed Switches

Test Code: 8148 / Version 1

Introduction to the Catalyst 3920

SOLO NETWORK (11) (21) (31) (41) (48) (51) (61)

1. What type of network cable is used between a terminal and a console port? cross-over straight-through rollover patch cable 2.

Avaya ExpertNet Lite Assessment Tool

Index. Numerics. Index p priority (QoS) definition Q VLAN standard w as a region 5-54

Overview. Switch Features CHAPTER

5 What two Cisco tools can be used to analyze network application traffic? (Choose two.) NBAR NetFlow AutoQoS Wireshark Custom Queuing

Internetwork Expert s CCNP Bootcamp. Hierarchical Campus Network Design Overview

A. ARPANET was an early packet switched network initially connecting 4 sites (Stanford, UC Santa Barbara, UCLA, and U of Utah).

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

Configuring EtherChannels and Link-State Tracking

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK

S5 Communications. Rev. 1

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT

Root-Cause Network Troubleshooting Optimizing the Process Tim Titus CTO, PathSolutions

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief

SYSTEMS ADMINISTRATION USING CISCO (315)

Oracle E-Business Suite 11i with Cisco ACE Series Application Control Engine Deployment Guide, Version 1.0

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Cisco EXAM CCNA Cisco Certified Network Associate. Buy Full Product.

3Com SuperStack 3 Switch and 48-Port Stackable Switches

Cisco Exam Cisco Interconnecting Cisco Networking Devices Part 1 (ICND) Version: 12.0 [ Total Questions: 202 ]

The MAC Address Format

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Communicating over the Network

AT-S41 Version 1.1.7C Management Software for the AT-8326GB and AT-8350GB Series Fast Ethernet Switches. Software Release Notes

Cisco EtherSwitch 4- and 9-Port High-Speed WAN Interface Cards Datasheet

Nighthawk S8000 Gaming & Streaming Advanced 8-Port Gigabit Ethernet Switch User Manual

Internetwork Basic. Possible causes of LAN traffic congestion are

4 PWR XL: Catalyst 3524 PWR XL Stackable 10/100 Ethernet

Powered by Accton. ES Port Gigabit Web-Smart Switch. Management Guide.

COPYRIGHTED MATERIAL. Con t e n t s. Chapter 1 Introduction to Networking 1. Chapter 2 Overview of Networking Components 21.

SOLO NETWORK (11) (21) (31) (41) (48) (51) (61)

C H A P T E R Overview Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide OL

Index. Numerics. Index 1

Need For Protocol Architecture

SOLO NETWORK (11) (21) (31) (41) (48) (51) (61)

Need For Protocol Architecture

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

CH : 15 LOCAL AREA NETWORK OVERVIEW

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS

Configuring EtherChannels and Link-State Tracking

CISCO SYSTEM ADMINISTRATION (41)

Top-Down Network Design

SWP-0208G, 8+2SFP. 8-Port Gigabit Web Smart Switch. User s Manual

CompTIA Network+ Course

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals:

Transcription:

CTS2134 Introduction to Networking Module 09: Network Management

Documentation Facts Good documentation: Ensures that users can find the information they need when making decisions or troubleshooting problems on your network. Details what must be done and how it is to be accomplished. Keeps track of what has happened and what actions were taken, and helps ensure that actions are consistent within your organization.

Policy A policy is a document that describes the overall goals and requirements for a network. A policy identifies what should be done, but may not necessarily define how the goal is to be reached. Depending on your network, you might define policies for different areas of implementation such as policies for: Administrative delegation Network documentation Security

Documentation A regulation is a requirement published by a government or other licensing body that must be followed. A procedure is a step by step process outlining how to implement a specific action. A network diagram shows the logical and/or physical layout of your network. A wiring schematic is a type of network diagram that focuses on the physical connections between devices.

Documentation Configuration documentation identifies specific configuration information for a device. Change or history documentation keeps track of changes to the configuration of a device or the network. A baseline is a snapshot of the performance statistics of the network or devices.

SNMP Facts Simple Network Management Protocol (SNMP) is a protocol designed for managing complex networks. SNMP lets network hosts exchange configuration and status information. Component Manager Agent Management Information Base (MIB) Trap Description A manager is the computer used to perform management tasks. The manager queries agents and gathers responses. An agent is software that runs on managed network devices. The MIB is a database of host configuration information. Agents report data to the MIB, and the manager can then view information by requesting data from the MIB. A trap is an event configured on an agent. When the event occurs, the agent logs details regarding the event.

Remote Management Facts Method Terminal emulation Remote desktop Description The terminal emulation software communicates with the device over the network, and displays the text based console screen. Telnet opens a plain text, unsecured connection. Telnet uses TCP port 23. Secure Shell (SSH) encrypts data and uses TCP port 22. Remote desktop displays the graphical user interface of a remote device. Remote desktop solutions are used to remotely manage a computer, or to allow support personnel to view and troubleshoot a remote user's system. The server software runs on the target desktop. When you run the client software, you see the desktop of the server system. The remote desktop protocol is responsible for the communication between the server and the client. Most remote desktop protocols support the following features: Client software for a variety of operating systems. Server software for a limited number of operating systems. Shows a remote desktop in a browser without installing client software. Redirecting printing, sound, or storage from the server to devices connected to the client.

Network Monitoring Facts The goal of monitoring is to keep track of conditions on the network, identify situations that might signal potential problems, identify the source of problems, and identify areas of your network that might need upgraded or changed.

Network Monitoring Facts Tool Logs Load Tester Throughput tester Packet sniffer Description Logs contain a record of events. Log entries are generated in response to configuration changes, changes in system state, or in response to network conditions. Load testers simulate a load on a server or service. Use a load tester to make sure that a system has sufficient capacity for expected loads, and even to estimate a failure point where the load is more than the system can handle. A throughput tester measures the amount of data that can be transferred through a network or processed by a device. On a network, a throughput tester sends data through the network and measures the time it takes to transfer that data. Use a throughput tester to validate the bandwidth on your network. A packet sniffer is special software that captures frames that are transmitted on the network. Identifies the types of traffic on a network. View the exchange of packets between communicating devices. Analyze packets sent to and from a specific device. View packet contents. You typically run a packet sniffer on one device with the intent of capturing frames for all other devices on a subnet. To enable the packet sniffer to capture frames sent to other devices, configure the NIC in promiscuous mode (sometimes called pmode).

Optimization Facts Network optimization has two main goals: Provide redundancy (fault tolerance ) of services or devices so that network access can continue in the event of a failure of one or more components. Ensuring that a network or a service is accessible most of the time is called high availability. Improve the response and performance of network services or devices.

Optimization Facts Solution Ethernet bonding Spanning tree Load balancing (clustering) Description Two or more physical connections to the same network are logically grouped. Data is divided and sent on multiple interfaces, increasing the speed at which the device can send and receive on the network. Bonding primarily provides increased performance, although some fault tolerance is provided if one NIC goes down. Spanning tree is a protocol on a switch that allows the switch to maintain multiple paths between switches within a subnet. The spanning tree protocol runs on each switch and is used to select a single path between any two switches. Spanning tree provides fault tolerance in case a switch port or network segment is broken, but does not provide increased performance. Load balancing configures a group of servers in a logical group. Incoming requests to the group are distributed to individual members within the group. The primary goal of load balancing is to improve performance by configuring multiple devices to respond as one. Load balancing also provides fault tolerance if the load balancing mechanism is able to detect when a specific farm member is unavailable, automatically distributing new requests to the available members.

Optimization Facts Solution Caching engine (proxy server) Quality of Service (QoS) Description Caching is the process of saving previously acquired data for quick retrieval at a later time. A common application of a caching engine on a network is a Caching engines are implemented primary to improve performance. They offer some degree of fault tolerance, allowing access to cached content even if the source device is offline. Quality of Service (QoS) refers to a set of mechanisms that tries to guarantee timely delivery or minimal delay of important or timesensitive communications. QoS is particular important when implementing Voice over IP (VoIP), Video over IP, or online gaming. Labels are used to prioritize traffic when bandwidth is limited. QoS limits the effects of packets arriving out of order, corrupt packets, or lost or dropped packets. Gives higher priority to some traffic QoS might include a guaranteed level of service.

Optimization Facts Solution Traffic shaper Multilayer switch/content switch Description A traffic shaper (bandwidth shaper) is a device that is capable of modifying the flow of data through a network in response to network traffic conditions. Used with QoS guarantees to ensure timely delivery of time sensitive data streams. Bandwidth throttling restricts the amount of data sent within a specific time period. A multilayer switch operates at other OSI model layers and can use other information within a packet for making forwarding decisions. A layer 3 switch uses the IP address for making forwarding decisions. Layer 4 7 switches (content switches, web switches, or application switches) are typically used for load balancing.

Network Segmentation Facts Network segmentation is the process of dividing the network to overcome problems, increase performance, maximize bandwidth, and reduce congestion. A collision domain is any network where devices share the same transmission medium and where packets can collide. A broadcast domain is any network or subnetwork where computers can receive frame level broadcasts from their neighbors. Note: A special condition called a broadcast storm happens when the amount of broadcast traffic consumes network bandwidth and prevents normal communications. Segmentation may increase both collision and broadcast domains.

Network Segmentation Facts Device Collision Domain Broadcast Domain Hub Switch Router All devices connected to the hub are in the same collision domain. All devices connected to a single port are in the same collision domain (each port is its own collision domain). All devices connected to a single interface are in the same collision domain. All devices are in the same broadcast domain. All devices connected to the bridge or the switch are in the same broadcast domain. All devices accessible through an interface (network) are in the same broadcast domain. Each interface represents its own broadcast domain if the router is configured to not forward broadcast packets.

Network Segmentation Facts Switch Router Bridge Choose a switch if you need to: Provide guaranteed bandwidth between devices Reduce collisions by decreasing the number of devices in a collision domain (effectively creating multiple collision domains) Reduce the number of devices within a broadcast domain (creating multiple broadcast domains on a switch is done by using VLANS. Implement full duplex communication Choose a router if you need to: Filter broadcast traffic to prevent broadcast storms Reduce the number of devices within a broadcast domain (effectively increasing the number of broadcast domains) Enforce network security Link unlike physical media (e.g. twisted pair and coaxial Ethernet) of the same architecture type