Sie sind auf Seite 1von 20

Confidential

Chapter 5
Network Management System
Confidential
Chapter Objectives
Define Network Management
Discuss Network Management architecture
Explain Performance Management
Explain Configuration Management
Explain Accounting Management
Explain Fault Management
Explain Security Management
Define NOS
Identify need of NOS
Explain some basic concepts related to network implementation
Implement network using Windows OS
Implement network using Linux OS
Confidential
An Overview of Network Management System
Explaining Purpose and Origin of Network
Management System
In the early 1980s computer networks began to grow and
be interconnected. As the size of these networks grew, they
became harder to manage and maintain, thus the need for
network management was realized. One of the oldest forms
of network management is the use of the remote login to
monitor or configure a network device; however, today
more sophisticated network management tools are
available. Network management is a requirement for
anyone who wants to control and monitor their networks.
Confidential
Identifying Functional Areas of Network
Management
Fault Management:
Configuration Management:
Accounting:
Performance Management:
Security Management:
The International Organization for Standardization (ISO) defined a
conceptual model for describing the key functional areas of network
management which are described below .
Confidential
Discussing Network Management Architecture
Network Management Architecture
Confidential
Introducing ISO Network Management Model
The ISO has contributed a great deal to network standardization. Its
network management model is the primary means for understanding
the major functions of network management systems. This model
consists of five conceptual areas, as discussed in the next sections.
Confidential
Explaining Performance Management
The goal of performance management is to measure and make
available various aspects of network performance so that internet
work performance can be maintained at an acceptable level.
Examples of performance variables that might be provided include
network throughput, user response times, and line utilization.
Confidential
Explaining Configuration Management
The goal of configuration management is to monitor network and
system configuration information so that the effects on network
operation of various versions of hardware and software elements
can be tracked and managed.
Confidential
Explaining Accounting Management
The goal of accounting management is to measure network
utilization parameters so that individual or group uses on the
network can be regulated appropriately. Such regulation minimizes
network problems (because network resources can be apportioned
based on resource capacities) and maximizes the fairness of
network access across all users.
Confidential
Explaining Fault Management
The goal of fault management is to detect, log, notify users of, and
(to the extent possible) automatically fix network problems to keep
the network running effectively. Because faults can cause downtime
or unacceptable network degradation, fault management is perhaps
the most widely implemented of the ISO network management
elements.
Confidential
Explaining Security Management
The goal of security management is to control access to network
resources according to local guidelines so that the network cannot
be sabotaged (intentionally or unintentionally) and sensitive
information cannot be accessed by those without appropriate
authorization. A security management subsystem, for example, can
monitor users logging on to a network resource and can refuse
access to those who enter inappropriate access codes.
Confidential
Basics of Network Operating System
Network Operating System (NOS) is an operating system that
includes special functions for connecting computers and devices
into a local-area network (LAN) or Inter-networking. Some popular
NOSs for DOS and Windows systems include Novell NetWare,
Windows NT and 2000, Sun Solaris and IBM OS/2. The Cisco IOS
(Internet Operating System) is also a network operating system with
a focus on the Internetworking capabilities of network devices.
Confidential
Identifying Need of NOS
Provide basic operating system features such as support for
processors, protocols, automatic hardware detection and support
multi-processing of applications
Security features such as authentication, authorization, logon
restrictions and access control
Provide name and directory services
Provide file, print, web services, back-up and replication services
Support Internetworking such as routing and WAN ports
User management and support for logon and logoff, remote access;
system management, administration and auditing tools with graphic
interfaces
Clustering capabilities; fault tolerant and high availability systems
Confidential
Implementing Network A Basic Introduction
Overview of TCP/IP
Overview of LAN Network Address
Overview of Network and Broadcast Addresses
Overview of Subnet Masks
Overview of Domain Name
Overview of Hostnames
Overview of IP Addressing
Overview of LAN Hardware
Confidential
Getting Introduced to Network Implementation
Using Windows OS
Introducing Network Implementation
These steps will take you through configuring your
computer to use the network and network services, and
installing the supported software.
Identifying the Required Steps
To perform network implementation in Windows OS, follow
the below mentioned essential steps:
1. Install and configure a network card
2. Configure the computer to use the network
3. Patch your Operating System
Confidential
Installing and Configuring a Network Card
Click on the Start button and select Settings then Control Panel.
Double click on the System icon.
Click on the Hardware tab.
Click on Device Manager.
You will see a list of devices installed in your computer.
If necessary, click on the + sign next to Network Adapters to expand the list.
Ensure that there is no yellow exclamation mark (!) next to the Network
Adapter. This indicates a possible problem with the card or configuration.
Double click on your network driver (e.g. NE2000 Compatible).
In the Device Status box you should see the message:
This Device is working correctly.
Confidential
Configuring the Computer to Use the Network
Click on the Start button and select Control Panel then Network and Internet Connections
Click Network and Internet Connections link, the Network and Internet Connections window is displayed
Then click on Network Connection link.
Right click on the Local Area Connection icon and select Properties.
If you don't have the Local Area Connection icon it is probably because your network card is not installed and
configured correctly (See Step 1 www.lboro.ac.uk/computing/hallnet/netcardxp.html).
Select Internet Protocol (TCP/IP).
Click on the Properties button.
Check that Obtain an IP address automatically, and Obtain DNS server address automatically are both
selected
Click on the advanced button and select the DNS tab in the Advanced TCP/IP Settings window.
Ensure that Register this connection's addresses in DNS is not selected.
Click OK, OK, then Close to close all boxes.
Click on the Start button and select Control Panel.
Click on Performance and Maintenance.
Click on See basic information about your computer.
Select the Computer Name tab.
Click the Change button.
In the Computer name box enter hallnet- followed by your username e.g. hallnet-ccuxb.
Change the Workgroup to HallNet.
Click OK.
Reboot when prompted
Confidential
Patching the Operating System
It is essential that you apply the latest patches to your Operating
System. Failure to do so may still leave your computer liable to
infection with viruses or unwanted software. If your computer does
become infected and is a problem to other users of the Network, we
will disconnect your computer until the problem is resolved
Confidential
Implementing Network Using Linux OS
Getting Introduced to LAN Setup in Linux OS
Installing the Hardware
Configuring the LAN
Using LinuxConf to Configure Ethernet Card
Configuring Nameserver Specification
Configuring Hostname Search Path
Setting up /etc/hosts File
Repeating for Every Host
Testing the LAN
Troubleshooting the LAN
Summarizing Network Setup in Linux
Confidential