Beruflich Dokumente
Kultur Dokumente
Chapter 18
Network Management
Now that you have learned how to design and build networks, you can perform tasks such
as selecting, installing, and testing cable, as well as determining where wiring closets will
be located. However, network design and implementation are only part of what you must
know. You also must know how to maintain the network and keep it functioning at an
acceptable level. To do this, you must know how to troubleshoot. In addition, you must
know when it is necessary to expand or change the network’s configuration to meet the
changing demands placed on it.
Network management is composed of many different areas, including network
documentation, network security, network maintenance, server administration, and server
maintenance. This list is not exhaustive, but it is more than enough to cover at this time.
Each of the listed topics is just as important as the rest, and none of them should be
overlooked.
Many administrators think that, as soon as the network is up and running, their job is over.
This couldn’t be further from the truth. When a network setup is complete, the real job of
a network administrator starts. In this chapter, you learn about managing a network by
using techniques such as documenting, monitoring, and troubleshooting.
Documentation
The first, and most critical, component of a good network is documentation.
Documentation is the most-talked-about and least-performed task in a network.
Documentation represents the network administrator’s memory. The following documents
assist you in properly documenting your network.
154
Comments:
155
Printer Configuration:
Serial Port Baud Stop Bits Parity Xon/X Interrupt
Rate off
Print Queues:
Print Operators:
Comments:
156
Software Listings
Computer Software Configuration Worksheet
Application Software:
Manufacturer: Version Service Network- Installation Data
Updates Capable Directory Directory
Maintenance Records
Computer Repair Worksheet
Department Charged:
Authorized By:
Repair Completed
By:
Comments:
157
Security Measures
Network Security Room Form
One Per Room
Physical Location: Date:
Physical Door Windows False Fire Locking
Security: Lock Ceiling Suppression Cabinets
Servers Tape
Backup:
Server Type Media Offsite Tape Set Start Day-
Name: Location Name of-Week
Server #1:
Server #2:
Server #3:
Authorized Name Department Function
Access:
Comments:
158
Network Duties/Privileges:
Comments:
159
Vocabulary Exercise
Define the following terms as completely as you can. Refer to Chapter 18 of the Cisco
Networking Academy Program CCNA 3 and 4 Companion Guide for help.
Back up operations The five types of back up operations are as follows:
1. Full backup
2. Incremental backup
3. Differential backup
4. Copy backup
5. Daily backup
Client/server The architecture of the relationship between a workstation and a server
in a network.
Costs of a network Network administration encompasses many responsibilities,
including cost analysis. This means determining not only the cost of network design and
implementation, but also the cost of maintaining, upgrading, and monitoring the network.
Determining the cost of network installation is not a particularly difficult task for most
network administrators. Equipment lists and costs can be readily established; labor costs
can be calculated using fixed rates. Unfortunately, the cost of building the network is just
the beginning.
Connection monitoring The process of users logging on to the network verifies that
connections are working properly, or the networking department will soon be contacted.
This is not the most efficient or preferable method of connection monitoring available,
however. Simple programs can enable the administrator to enter a list of host IP addresses
so that these addresses are periodically pinged. If a connection problem exists, the
program will alert the administrator by the ping output. This is an inefficient and primitive
way to monitor the network, but it is better than nothing.
Cut sheet diagrams A rough diagram indicating where cable runs are located and the
numbers of rooms they lead to.
Data recovery Data recovery, the second part of network security, involves protecting
data from loss. Multiple methods exist for this, and usually more than one method is used
at the same time to protect the data. As shown in, three popular data protection methods
are tape backup of data, fault-tolerant disk configurations, and the use of uninterruptible
power supplies (UPSs) to prevent equipment shutdowns during electrical power outages.
EMI (electromagnetic interference) Interference by electromagnetic signals that can
cause reduced data integrity and increased error rates on transmission channels.
Error report documentation This document is used to gather the basic information
necessary to identify and assign a network problem, and it also provides a way of tracking
the progress and eventual solution of the problem. Problem reports provide justification to
senior management for hiring new staff, purchasing equipment, and providing additional
training. This documentation also provides solutions to recurring problems that have
already been resolved.
160
RFI (radio frequency interference) Radio frequencies that create noise that interferes
with information being transmitted across unshielded copper cabling.
RMON (remote monitoring) MIB agent specification described in RFC 1271 that
defines functions for the remote monitoring of networked devices. The RMON
specification provides numerous monitoring, problem-detection, and reporting capabilities.
SNMP (Simple Network Management Protocol) Network management protocol
used almost exclusively in TCP/IP networks. SNMP provides a means to monitor and
control network devices, and to manage configurations, statistics collection, performance,
and security.
Software viruses A virus is a program that “infects” computer files (usually other
executable programs) by inserting copies of itself in those files. This is usually done in
such a manner that the copies will be executed when the file is loaded into memory,
allowing them to infect still other files, and so on. Viruses often have damaging side
effects, sometimes intentionally, sometimes not. The latest variation is to send these
viruses over the Internet as e-mail attachments.
Static, dust, dirt, and heat A cause of static is lack of humidity in the air, so it is
important to make sure that the rooms that hold equipment have proper temperature and
humidity control. Keep dust and dirt out of the keyboards, disk drives, and equipment air
vents. Keeping the environment in which equipment is used clean and free of contaminants
does this.
Don’t let the equipment overheat; computers and other network equipment have built-in
fans to cool them. Make sure not to block any of the equipment’s cooling vents, either.
Make sure that your work area leaves the computers vents open.
Traffic monitoring Traffic monitoring is a more sophisticated method of network
monitoring. It looks at the actual packet traffic on the network and generates reports
based on the network traffic. Programs such as Microsoft Windows NT Network Monitor
and Fluke’s Network Analyzer are examples of this type of software. These programs not
only detect failing equipment, but they also determine whether a component is overloaded
or poorly configured.
Focus Questions
Network security involves two major components. The first is keeping your
network safe from unauthorized access, and the second is ensuring your ability to
recover data from catastrophic events.
3. What environmental factors need be considered when managing a network?
Step 4. If the problem isn’t resolved, undo previous changes and modify the
data.
Although there are many reasons to monitor a network, the two primary reasons
are to predict changes for future growth and to detect unexpected changes in
network status. Unexpected changes might include things such as a router or
switch failing, a hacker trying to gain illegal access to the network, or a
communication link failure. Without the ability to monitor the network, an
administrator can only react to problems as they occur instead of preemptively
preventing these problems.
9. Describe problem solving as it relates to network troubleshooting.
Note taking can define a clear path to diagnosing a problem. It can tell you what
you have already tried and what effect that had on the problem. This can be
extremely valuable to the troubleshooter so that previous attempts at resolving the
problem won’t be needlessly repeated.
11. Describe the administrative side of managing networks.
a. Full backup
b. Incremental backup
c. Copy backup
d. Differential backup
13. Raid 1 features what type of disk redundancy?
a. Disk striping
b. Disk backup
c. Disk duplexing
d. No redundancy
14. A network baseline is the comparison value to measure what about a
network?
a. Security
b. Design
c. Structure
d. Performance
15. A peer-to-peer network establishes what type of relationship between end
stations?
a. Client to client
b. Client to server
c. Server to server
d. Server to Internet
16. Which type of file system does Windows NT use for security purposes?
a. Fat 16
b. Fat 32
c. NTFS
d. NFS
17. A document that shows the physical layout of a building’s network wiring is
called what?
a. Cut sheet
b. Layout diagram
c. Floor plan
d. Access list
a. 1
b. 2
c. 3
d. 4
19. In a client/server network, the ability of a user to access certain files while not
being able to access other files are called the user what?
a. Accesses
b. Rights
c. Abilities
d. Securities
20. What is the IP address of the internal loopback?
a. 10.10.10.1
b. 255.255.255.0
c. 127.0.0.1
d. 192.0.0.1
21. What is one way to prevent static electricity damage?
a. SMTP
b. NFS
c. SNMP
d. FTP
e. IPX
23. To list your IP setting on a Windows NT computer, you would run the
________ command.
a. IP
b. IPCONFIG
c. WINIPCFG
d. SHOW IP
e. CONFIG
24. Which of the following is a troubleshooting method used in network
troubleshooting?
a. Loopback readout
b. Divide and conquer
168
a. IPX
b. UDP
c. IP
d. Telnet
e. HTTP
26. What is the most basic form of connection monitoring?
a. WINIPCFG
b. Tracert
c. NetMonitor
d. LanMeter
e. Logging on
27. RMON is an extension of what protocol?
a. SNMP
b. UDP
c. IPX
d. PING
e. SMTP
28. What does the -n protocol option stands for in the ping command?
a. Commands
b. Tables
c. Lists
d. Probes
e. User interaction
30. The cost of _______ equipment for mission-critical operations needs to be
added to the cost of maintaining the network.
169
a. Redundant
b. Expensive
c. Mechanical
d. Security
e. Welding