Sie sind auf Seite 1von 92

Network Administration and

Management
Prepared by: Inocencio, Rose M.
Chiquito, Wilson
Santiago, John Robert
Tamundez, Jonh Kister
Violago, Ashley Pearl N.
BRIEF HISTORY OF COMPUTER
NETWORK TECHNOLOGY
A Computer Network, or simply a network is a collection of computers and
other hardware components interconnected by communication channels that allow
sharing and resources and information.
 1940- George Stibitz used a Teletype machine to send instructions for a problem
set form his Model at Dartmouth College to his Complex Number Calculator in
New York and received results back by the same means.
 1950- Earl networks of communicating computers included the military radar
system Semi-Automatic Ground Environment (SAGE), started in the late 1950s.
 1960- The commercial airline reservation System Semi- automatic Business
Research Environment (SABRE) went online with two connected mainframes.
BRIEF HISTORY OF COMPUTER
NETWORK TECHNOLOGY
 1962- Linking output systems like teletypewriters to computers was an interest to
the Advanced Research Project Agency (ARPA) , when J.C.R Licklider was hired
and developed a working group called the “Intergalactic Computer Network”.
This concept allowed the date and programs stored within each computer to be
accessed from anywhere in the world, by any of the computers connected to the
network.
 1964- Researchers at Dartmouth developed the Dartmouth Time Sharing System
for distributed users of large computer systems.
 1965- Thomas Maril and Lawrence G. Roberts created the first WAN. This was
an immediate precursor to the ARPANET, of which Roberts became Program
Manager. At the same time, the first widely used telephone switch that used true
computer control was introduced by Western Electric.
BRIEF HISTORY OF COMPUTER
NETWORK TECHNOLOGY
 1972- Commercial Services using X.25, were deployed, and later used as
an underlying infrastructure for expanding TCP/IP networks.
 1991- Home Broadband was created.
 1996- The 56k modem was invented by Dr. Brent Townshend.
 2000- In late March 2000, Cisco achieved a stock market capitalization
(valuation) of more than $550 million that officially made Cisco the single
most valuable corporation in the world at that time-literally a “Fortune 1”
company.
BRIEF HISTORY OF COMPUTER
NETWORK TECHNOLOGY
 2001- Home broadband opens mainstream usage and begins growing at a
faster rate than Internet dial-up services.
 2009- 10 Gigabit Ethernet (GE) was the only market segment to show
sequential port an revenue growth in 2009, due in large part to shipments
of purpose built fixed 10 GE boxes for the data center.
 2010- 100 Gigabit standard fully completed.
 2020- The Terabit Optical Ethernet Center are aiming for 1 Terabit
Ethernet over optical fiber- One Trillionth bits per second. By 2015, with
the ultimate goal of enabling 200 Terabit Ethernet by 2020.
BRIEF HISTORY OF COMPUTER
NETWORK TECHNOLOGY
Conclusion:
 Today, computer networks are the core of modern communication. All
modern aspects of the public switched telephone network (PSTN) are
computer- controlled, and telephony increasingly runs over the Internet
Protocol. The scope of communication has increased significantly in the
past decade, and this boom in communications would have not been
possible without the progressively advancing computer network.  
Introduction to Networking Terminology,
Interfaces, and Protocols
Introduction
A basic understanding of networking is important for anyone managing a
server. Not only is it essential for getting your services online and running
smoothly, it also gives you the insight to diagnose problems.
Overview
This document will provide a basic overview of some common
networking concepts. We will discuss basic terminology, common protocols,
and the responsibilities and characteristics of the different layers of
networking.
Networking Glossary
 Connection- In networking, a connection refers to pieces of related information
that are transfered through a network. This generally infers that a connection is
built before the data transfer (by following the procedures laid out in a protocol)
and then is deconstructed at the at the end of the data transfer.
Ex: wireless and wired connection
Packet

 A packet is, generally speaking, the most basic unit that is transferred over
a network. When communicating over a network, packets are the
envelopes that carry your data (in pieces) from one end point to the other.
 Packets have a header portion that contains information about the packet
including the source and destination, timestamps, network hops, etc.
The main portion of a packet contains the actual data being transferred.
It is sometimes called the body or the payload.
Network Interface
 A network interface can refer to any kind of software interface to
networking hardware. For instance, if you have two network cards in your
computer, you can control and configure each network interface associated
with them individually.
 A network interface may be associated with a physical device, or it may
be a representation of a virtual interface. The "loopback" device, which is
a virtual interface to the local machine, is an example of this.
LAN and WAN
 LAN: LAN stands for "local area network". It refers to a network or a
portion of a network that is not publicly accessible to the greater internet.
A home or office network is an example of a LAN.
 WAN: WAN stands for "wide area network". It means a network that is
much more extensive than a LAN. While WAN is the relevant term to use
to describe large, dispersed networks in general, it is usually meant to
mean the internet, as a whole. If an interface is said to be connected to the
WAN, it is generally assumed that it is reachable through the internet.
Protocol
 A protocol is a set of rules and standards that basically define a
language that devices can use to communicate. There are a great
number of protocols in use extensively in networking, and they are
often implemented in different layers.
 Some low level protocols are TCP, UDP, IP, and ICMP. Some
familiar examples of application layer protocols, built on these
lower protocols, are HTTP (for accessing web content), SSH,
TLS/SSL, and FTP.
Port, Firewall, NAT and VPN

 Port: A port is an address on a single machine that can be tied to a


specific piece of software. It is not a physical interface or location,
but it allows your server to be able to communicate using more than
one application.
 Firewall: A firewall is a program that decides whether traffic
coming into a server or going out should be allowed. A firewall
usually works by creating rules for which type of traffic is
acceptable on which ports. Generally, firewalls block ports that are
not used by a specific application on a server.
Port, Firewall, NAT and VPN
 NAT: NAT stands for network address translation. It is a way to translate
requests that are incoming into a routing server to the relevant devices or
servers that it knows about in the LAN. This is usually implemented in
physical LANs as a way to route requests through one IP address to the
necessary backend servers.
 VPN: VPN stands for virtual private network. It is a means of connecting
separate LANs through the internet, while maintaining privacy. This is
used as a means of connecting remote systems as if they were on a local
network, often for security reasons.
Network Layers
 What this means is that there are multiple technologies and protocols
that are built on top of each other in order for communication to
function more easily. Each successive, higher layer abstracts the raw
data a little bit more, and makes it simpler to use for applications and
users.
 It also allows you to leverage lower layers in new ways without having
to invest the time and energy to develop the protocols and
applications that handle those types of traffic.
 Each layer has the ability to add its own "wrapper" around the data
that it receives from the adjacent layer, which will help the layers that
come after decide what to do with the data when it is passed off.
OSI Model
 OSI stands for Open Systems Interconnect. Historically, one method of
talking about the different layers of network communication is the OSI
model
 OSI Model Layers:
 Application: The application layer is the layer that the users and user-
applications most often interact with. Network communication is
discussed in terms of availability of resources, partners to
communicate with, and data synchronization.
 Presentation: The presentation layer is responsible for mapping
resources and creating context. It is used to translate lower level
networking data into data that applications expect to see.
OSI Model
 OSI Model Layers:
 Session: The session layer is a connection handler. It creates,
maintains, and destroys connections between nodes in a persistent way.
 Transport: The transport layer is responsible for handing the layers
above it a reliable connection. In this context, reliable refers to the
ability to verify that a piece of data was received intact at the other end
of the connection.
This layer can resend information that has been dropped or corrupted
and can acknowledge the receipt of data to remote computers.
OSI Model
 OSI Model Layers:
 Data Link: This layer is implemented as a method of establishing and
maintaining reliable links between different nodes or devices on a network
using existing physical connections.
 Network: The network layer is used to route data between different
nodes on the network. It uses addresses to be able to tell which
computer to send information to. This layer can also break apart larger
messages into smaller chunks to be reassembled on the opposite end.
 Physical: The physical layer is responsible for handling the actual
physical devices that are used to make a connection. This layer
involves the bare software that manages physical connections as well
as the hardware itself (like Ethernet).
TCP/IP Model
The TCP/IP model, more commonly known as the Internet protocol
suite, is another layering model that is simpler and has been widely adopted.
It defines the four separate layers, some of which overlap with the OSI
model:
 Application: In this model, the application layer is responsible for
creating and transmitting user data between applications. The applications
can be on remote systems, and should appear to operate as if locally to the
end user.
 Transport: The transport layer is responsible for communication between
processes. This level of networking utilizes ports to address different
services. It can build up unreliable or reliable connections depending on
the type of protocol used.
TCP/IP Model
 Internet: The internet layer is used to transport data from node to node in
a network. This layer is aware of the endpoints of the connections, but
does not worry about the actual connection needed to get from one place
to another. IP addresses are defined in this layer as a way of reaching
remote systems in an addressable manner.
 Link: The link layer implements the actual topology of the local network
that allows the internet layer to present an addressable interface. It
establishes connections between neighboring nodes to send data.
As you can see, the TCP/IP model, is a bit more abstract and fluid. This
made it easier to implement and allowed it to become the dominant way that
networking layers are categorized.
Interfaces
 Interfaces are networking communication points for your computer. Each
interface is associated with a physical or virtual networking device.
 Typically, your server will have one configurable network interface for
each Ethernet or wireless internet card you have.
 In addition, it will define a virtual network interface called the "loopback"
or localhost interface. This is used as an interface to connect applications
and processes on a single computer to other applications and processes.
You can see this referenced as the "lo" interface in many tools.
 Many times, administrators configure one interface to service traffic to the
internet and another interface for a LAN or private network.
Protocols
 Networking works by piggybacking a number of different protocols on top
of each other. In this way, one piece of data can be transmitted using
multiple protocols encapsulated within one another.
 We will talk about some of the more common protocols that you may
come across and attempt to explain the difference, as well as give context
as to what part of the process they are involved with.
 We will start with protocols implemented on the lower networking layers
and work our way up to protocols with higher abstraction.
Media Access Control
 Media access control is a communications protocol that is used to
distinguish specific devices. Each device is supposed to get a unique MAC
address during the manufacturing process that differentiates it from every
other device on the internet.
 Addressing hardware by the MAC address allows you to reference a
device by a unique value even when the software on top may change the
name for that specific device during operation.
 Media access control is one of the only protocols from the link layer that
you are likely to interact with on a regular basis.
IP
 The IP is one of the fundamental protocols that allow the internet to work.
IP addresses are unique on each network and they allow machines to
address each other across a network. It is implemented on the internet
layer in the IP/TCP model.
 Networks can be linked together, but traffic must be routed when crossing
network boundaries. This protocol assumes an unreliable network and
multiple paths to the same destination that it can dynamically change
between.
 There are a number of different implementations of the protocol. The most
common implementation today is IPv4, although IPv6 is growing in
popularity as an alternative due to the scarcity of IPv4 addresses available
and improvements in the protocols capabilities.
ICMP
 stands for internet control message protocol.
 It is used to send messages between devices to indicate the availability or
error conditions. These packets are used in a variety of network diagnostic
tools, such as ping and traceroute.
 Usually ICMP packets are transmitted when a packet of a different kind
meets some kind of a problem. Basically, they are used as a feedback
mechanism for network communications.
TCP
 TCP stands for Transmission Control Protocol.
 It is implemented in the transport layer of the IP/TCP model and is used to
establish reliable connections.
 TCP is one of the protocols that encapsulate data into packets. It then
transfers these to the remote end of the connection using the methods
available on the lower layers. On the other end, it can check for errors,
request certain pieces to be resent, and reassemble the information into
one logical piece to send to the application layer.
 The protocol builds up a connection prior to data transfer using a system
called a three-way handshake. This is a way for the two ends of the
communication to acknowledge the request and agree upon a method of
ensuring data reliability.
UDP
 UDP stands for User Datagram Protocol. It is a popular companion
protocol to TCP and is also implemented in the transport layer.
 The fundamental difference between UDP and TCP is that UDP offers
unreliable data transfer. It does not verify that data has been received on
the other end of the connection. This might sound like a bad thing, and for
many purposes, it is. However, it is also extremely important for some
functions.
 Because it is not required to wait for confirmation that the data was
received and forced to resend data, UDP is much faster than TCP. It does
not establish a connection with the remote host, it simply fires off the data
to that host and doesn't care if it is accepted or not.
HTTP and FTP
 HTTP- stands for hypertext transfer protocol. It is a protocol defined in
the application layer that forms the basis for communication on the web.
It defines a number of functions that tell the remote system what you
are requesting. For instance, GET, POST, and DELETE all interact with the
requested data in a different way.
 FTP- stands for file transfer protocol. It is also in the application layer
and provides a way of transferring complete files from one host to another.
It is inherently insecure, so it is not recommended for any externally
facing network unless it is implemented as a public, download-only
resource.
DNS and SSH
 DNS- stands for domain name system. It is an application layer protocol
used to provide a human-friendly naming mechanism for internet
resources. It is what ties a domain name to an IP address and allows you to
access sites by name in your browser.
 SSH- stands for Secure Shell. It is an encrypted protocol implemented in
the application layer that can be used to communicate with a remote server
in a secure way. Many additional technologies are built around this
protocol because of its end-to-end encryption and ubiquity.
 There are many other protocols that we haven't covered that are equally
important. However, this should give you a good overview of some of the
fundamental technologies that make the internet and networking possible.
Network Administration
Why do we need Network Administration

 All those nice, expensive servers your company is running are worthless if
they cannot talk to each other. That is what network admin does… he lets
them talk.
 While your server infrastructure is what your company lives and dies on..
the services, products, and data are the life blood of the system… the
network is what makes them do what they do. If the data your company
has is the lifeblood.. the network is the circulatory system. Network
admins are quite possibly the most essential IT position in a company.
Top 10 things to know about network
administration
1. The OSI model: Memorize it. It's almost a cliché, but
understanding it is critical.
Top 10 things to know about network
administration
2. TCP/IP concepts: Learn to think in binary and get a firm grasp on
bitmasks, subnetting, gateways (like the "default gateway") and how
addresses are constructed (the network portion, the host portion, etc).
Top 10 things to know about network
administration
3. Stacks: Read about how the network stack is implemented on hosts.
Get a good feel for what each component (the NIC, firmware, device
drivers, the OS, etc) is responsible for. Once you understand this,
troubleshooting is easy.
Top 10 things to know about network
administration
4. Layer 2: Learn how switches operate and how they're different from
hubs and routers. Understand bridging, and get a general idea of what
Spanning Tree Protocol does. Learn the difference between a collision
domain and a broadcast domain, and then study VLANs.
Top 10 things to know about network
administration
5. Routing: Learn a routing protocol. Start with RIP, because it's easy.
You don't need to be a guru, just get a general idea about how routers
can exchange information about the network.
Top 10 things to know about network
administration
6. Services: Understand the role of DNS and DHCP and WINS and
know their alternatives, like the host and lmhost files and static
addressing.
Top 10 things to know about network
administration
7. Find yourself some good networking reference material.
Whatis.com is a great for deciphering arcane acronyms.
Top 10 things to know about network
administration
8. Security: Read a little about how firewalls operate and other
security technologies like VPNs. Understand the difference between
authentication, authorization and accounting.
Top 10 things to know about network
administration
9. Output: Learn how to get status and information out of your
networking devices. A good place to start is with the "show"
commands (which will be featured in next week's tip).
Top 10 things to know about network
administration
 10. Finally, do a walkthrough: follow data as it goes from one application to
another. How does it get from the application, to being segmented, packetized,
framed, and routed? How does your computer know what IP address to send the
packet to? (DNS) How does it know what MAC address to send it to? (ARP)
How does it know how big to make the frame? (MTU) How does a switch know
which port to forward your packet out on? (FDB) How does a router know which
interface to use? (routing table) If you can answer these questions, you're well on
your way to being competent and productive.
Network Administrator

 is an IT expert who manages an organization's network.


 Network administrators keep networks operational and monitor
functions and operations within the network.
 A network administrator is responsible for installing, maintaining
and upgrading any software or hardware required to efficiently run a
computer network. The IT or computer network may extend to a
local area network, wide area network, the Internet and intranets.
How to be a Network Administrator
 Network administrators should know how to configure complex
networks, with the ability to manage, control, and monitor server
infrastructures. The basic types of wireless networks these professionals
should know include a Local Area Network (LAN), Wide Area Network
(WAN), and Virtual Private Network (VPN).
 Organizations must remain up-to-date on network infrastructures to be
able to host the latest technologies, as well as update security protocols as
needed. This ever-changing industry demands a flexible network
administrator who is adaptable to change
Responsibilities of Network Administrator

As a network administrator, your tasks generally fall into the


following areas:
 Designing and planning the network
 Setting up the network
 Maintaining the network
 Expanding the network
Designing the Network
 The first phase in the life cycle of a network involves creating its design, a
task not usually performed by new network administrators.
 Designing a network involves making decisions about the type of network
that best suits the needs of your organization.
 In larger sites this task is performed by a senior network architect.
Setting Up the Network
 The second phase of network administration involves setting up and
configuring the network.
 This consists of installing the hardware that makes up the physical part of
the network, and configuring the files or databases, hosts, routers, and
network configuration servers.
 The tasks involved in this phase are a major responsibility for network
administrators.
Maintaining the Network
The third phase of network administration consists of ongoing
tasks that typically constitute the bulk of your responsibilities.
They might include:
 Adding new host machines to the network
 Administering network security
 Administering network services, such as NFSTM services, name services,
and electronic mail
 Troubleshooting network problems
Expanding the Network
 The longer a network is in place and functioning properly, the more
your organization might want to expand its features and services.
 Initially, you can increase network population by adding new hosts
and expanding network services by providing additional shared
software.
 But eventually, a single network will expand to the point where it
can no longer operate efficiently. That is when it must enter the
fourth phase of the network administration cycle: expansion.
Expanding the Network
Several options are available for expanding your network:
 Setting up a new network and connecting it to the existing network
using a machine functioning as a router, thus creating an internetwork
 Configuring machines in users' homes or in remote office sites and
enabling these machines to connect over telephone lines to your network
 Connecting your network to the Internet, thus enabling users on your
network to retrieve information from other systems throughout the
world
 Configuring UUCP communications, enabling users to exchange files and
electronic mail with remote machines
Basically the roles of network administration
are…
Typical daily activities and marketable skill sets for network
administrators include the following. Network administrators:
 Configure and maintain the organization's internal computer
network.
 Manage network security tools, e.g., firewall, anti-virus and
intrusion detection systems.
 Identify, troubleshoot, solve and document network connectivity
and performance issues.
Basically the roles of network administration
are…
 Install and support hard-line telephones and other networked
telecommunication devices.
 Monitor network performance and optimize the network for optimal
speed and availability.
 Install, configure and maintain network hardware, for example,
Cisco routers and switches.
Basically the roles of network administration
are…
 Deploy, configure and upgrade network software, such as, enterprise
antivirus or diagnostics programs.
 Implement and maintain emergency backup and restore systems for
mission-critical network servers.
 Network administrators regulate user access to sensitive files to
protect against internal security breaches.
 In smaller companies, network administrators are often responsible
for end-user desktop support, and the
maintenance of servers and other networked devices.
Skills That All Good Network
Administrators Have in Common
 1. Critical Thinking –
Network admins will need to explore and solve various problems
logically and consistently. Even if you don’t know the solution right away,
the ability to analyze the situation and think critically will go a long way in
figuring out a solution. 
Skills That All Good Network
Administrators Have in Common
2. Time Management –
Network admins will have to juggle several projects at the same time,
dealing with people and solving various problems. This automatically means
that they should be able to keep themselves organized and make sure that
everything is balanced.  
Skills That All Good Network
Administrators Have in Common
3. Communication Skills – 
Good interpersonal skills are of utmost importance for network admins.
Since they work with a broad range of people, from network engineers to
end-users, being able to bridge the gaps between these groups of people will
go a long way. 
Skills That All Good Network
Administrators Have in Common
4. Always Look To Learn and Evolve –
The I.T. field is notorious for its quick development and change.
Network admins can’t afford to not stay on top of the latest trends and
demands if they wish not to become obsolete.  
Network Structure
 A network structure is the one in which more than one organization combine to
produce a good or provide a service.
 These organizations can either get into a partnership for a particular venture, or
one organization can hire others to handle one or more of its functions
(outsourcing), for example, marketing, production, sales and so on.
 An organization that has been using network structure is H&M (Hennes &
Mauritz), a very popular brand that has followers world over. H&M has
outsourced the production and processing of their goods to different countries
majorly Asian and South East Asian countries.
Networked Environment

 A communications system that ties multiple users together.


See network, LAN and Internet.
 Modern network environments generate a tremendous
amount of security event and log data via firewalls,
network routers and switches, NIDS/NIPS, servers, anti-
malware systems, and so on.
Network Management
Network Management

 Network management is a broad range of functions including


activities, methods, procedures and the use of tools to
administrate, operate, and reliably maintain computer network
systems.
 Strictly speaking, network Management does not include terminal
equipment (PCs, workstations, printers, etc.). Rather, it concerns the
reliability, efficiency and capacity/capabilities of data transfer
channels.
Types of network management services:

 Address management – managing network addresses and ensuring


that there is no address conflicts in the network. The problem can be
resolved remotely over the network.
Types of network management services:

 Security management – checking that network is being currently


secured and notify administrator in case of a breach.
Types of network management services:

 Traffic management – monitoring the network and checking for


the network overload. Traffic monitoring is critical for the large
scale networks.
Types of network management services:

 Load balancing – depending on data transfer activity, traffic would


be distributed evenly on the network. This is required for Web
servers which have unpredictable amount of requests.
Types of Hardware and Software management
services:
 Hardware diagnosis - all the hardware equipment is being
monitored and in case of failure, the administrator is being notified.
Types of Hardware and Software management
services:
 Hardware and software management – system automatically
gathers information about all hardware units in the network and
about software installed. Each clients workstations information is
being stored in the database.
Types of Hardware and Software management
services:
 Data backup and restore – automatic and usually scheduled process of
storing a copy of data on backup servers and restoring information from
them on demand.
File or software distribution system allows automatically send files or
install software remotely on number of workstations. Either server or client
himself triggers the installation process.
Network Management Tools
1. Appropriate network routing
 Network management tools interconnect each piece of
networking equipment – computers, hard drives, printers, and
even phone systems – allowing them all to communicate with
each other efficiently.
Network Management Tools
2. Network system management security
 A good network system management includes a traffic monitor that allows
you to view everything on your network. You’ll see where users are going,
the IP addresses they’re coming from, and if they’re trying to access
unauthorized information or files. Whether intruders are coming from within
your company or from the Internet, you’ll be able to stop information theft
before it occurs.
Network Management Tools
3. Take inventory of your network
 A quick scan of your network will enable you to view inventory of all
hardware, software, applications, and equipment connected to your network.
Not only will this give you a snapshot of your IT asset inventory, it will also
allow you to detect unwanted users on your network who may be stealing
bandwidth or, worse yet, confidential company information. Regular scans
will help eliminate internal equipment theft and also detect malfunctions
before they take down your entire system.
Network Manager Roles and Responsibilities

 In a large enterprise, network manager job responsibilities may


extend to overseeing multiple networks in one or more locations.
 In addition, the manager may help with developing new network
systems as a company or organization grows. Such a network may
include a local area network, a wide area network, a storage area
network, a virtual LAN, as well as local intranet or extranet servers
and resources.
Network Manager Roles and Responsibilities

 The role of the network manager is to regularly meet with


members of the IT team, and advocate for the IT needs of one or
more business units, whether it's from an operational, profit or
service standpoint.
 The network manager doesn't often interface directly with end
users but may help train support staff to do so.
Network Manager Roles and Responsibilities

Responsibilities of these managers include


 overseeing the work of computer support staff,
 researching new technology options,
 creating plans for upgrades and new equipment installations,
 examining cost versus benefits,
 communicating computer needs to management and negotiating deals
with technology suppliers roles,
Network Manager Roles and Responsibilities

Responsibilities of these managers include


 Managing and maintaining the network, as well as network performance,
 monitoring, Identifying, installing and maintaining upgrades to the network,
 Troubleshooting and repair,
 Overseeing user access to the network,
 Developing a backup/disaster recovery plan for a network emergency,
Network Manager Roles and Responsibilities

Responsibilities of these managers include


 Planning network infrastructure for new applications and services,
 Training network staff to provide support to end users,
 Purchasing and maintaining networking equipment and infrastructure,
 Integrating mobile devices into the organization's networks, either (or
both of) organizational and personal devices (BYOD)
Areas of Network Management
 Performance Management:
To quantify, measure, report, analyze, and control the
performance (e.g, utilization and throughput) of different network
components are the main goal of performance management.
These components include individual devices (e.g, links,
routers, and hosts) as well as the end to end abstraction such as a path
through the network. Protocol standard such as the
Simple Network Management Protocol (SNMP) play a central role in
Internet performance management.
Areas of Network Management
 Fault Management:
The goal of fault management is to log, detect, and respond
to fault condition int the network. The difference between fault
management and performance management is blurred.
The fault management is used to manage immediate handling of the
failures like link failure, host failure, or router hardware problem,
these problems are also known as a transient network failure. With
the help of performance management, the SNMP protocol plays a
major part in fault management.
Areas of Network Management
 Configuration Management:

Tracking of the devices that are on the managed network and the
hardware and software configurations are allowed by Configuration
management.
Areas of Network Management
 Accounting Management:

To specify, log, and control user and device access to network


resources are allowed by Accounting management. usage quotas,
usage-based charging, and the allocation of resource-access privileges
all fall under accounting management.
Areas of Network Management
 Security Management:
The goal of security management is to control access to
network resource according to some well-defined policy. The key
distribution centres are a component of network management.
The use of firewalls to monitor and control external access point to
one’s network is another crucial component.
Why Network Management is Essential for
Businesses
Business Leads
 Managing a network is an excellent approach to acquire new
business leads. Using the contacts, you can get in touch with your
clients to open doors for new business opportunities. Connect
professionally when you follow up on leads, as SMBs and
enterprises level businesses always look for outsourcing companies
to manage their network. Always be on time and use common
courtesy while following up with your contacts.
Why Network Management is Essential for
Businesses
Identify Best Practices
 Network monitoring is the best way to determine the best practices
or industry benchmark for business. Learning from what others do is
a significant strategy for your company. Network management
services ensure that your IT infrastructure management tools and
devices work smoothly. Monitoring helps you to recognize the
existence and changes within your organization’s IT. It also assists
you to define the importance of latest technologies for your
business.
Why Network Management is Essential for
Businesses
New Business Trends
 Networking can help you stay ahead in this competitive era of
advancing technology and new business trends in your industry.
These relationships and “inside” information can add advantage to
your business over your competitors by applying new and fresh
methods of doing things. It also allows businesses to generate new
leads, whether it is a new partner for future project or a new
customer.
Why Network Management is Essential for
Businesses
Save Money
 A professional network team can save you lots of money with their
expertise, knowledge and resourceful network management skills.
They keep themselves up-to-date with the latest technological trends
of network industry that can create opportunities for you. By being
proactively associated with your IT infrastructure, you can be sure
that you will encounter less downtime and achieve enhanced
productivity.
Why Network Management is Essential for
Businesses
Accelerated Growth
 Services provided by a network solution provider can help your
business become poised for an increased growth. With a tailored,
scalable, and reliable network services in place, your organization
will be able to acknowledge possibilities for growth whenever it
arises. You can rest assured when there is a team of specialists to
help transition larger scale operations for your organization.
Why Network Management is Essential for
Businesses
Proactively Managed Network
 The network service provider will determine the weakness of your
IT infrastructure and handle those problems appropriately before
they expand to a crisis point. To manage the network dynamically,
network solution providers consider real-time and historical
reporting of your network’s usage and its statistics.
 A precisely set up network helps is raising your business through
technology performance, diminishes overall cost and empowers
focus on internal IT resources..
Difference between Network
Administration and Network
Management
Difference between Network Administration
and Network Management
Network Administration Network management
 on the other hand, has more to  is more about the network
do with making sure that users infrastructure itself.
have access to the network  Managing bandwidth,
that their network accounts  strategic planning,
work properly, things like that.
 Wide area networks,
 Has more to do with the
 monitoring network devices,
services that run on the
 worrying about security,
network
Difference between Network Administration
and Network Management
Network Administration Network management
 often times more on the server  upgrades to the network,
administration side of things,  and the tools like SNMP and
like Active Directory network management
integration, etc. workstations and applications.
 It's all about the infrastructure
 It's all about the services and
and getting bandwidth to the
getting those services to the users.
user.
Difference between Network Administration
and Network Management
 Network Administrator  Network Manager,
job is to keep the network up he is answerable to all
and running all time during network related queries and
business hours. all additional lower / higher
end Network problems
designing and deployment.
Resources
 https://
searchnetworking.techtarget.com/tip/Top-10-things-to-know-about-network-administration
 https://www.geeksforgeeks.org/areas-of-network-management/
 https://
www.itcareerfinder.com/it-careers/network-administrator.html?fbclid=IwAR2luZqpAko8XKy-
DeGbkJjsv1u0ObnLPTnBEio8QGrddpZK4ocAHuj5iS4
 https://specialties.bayt.com/en/specialties/q/223038/what-is-different-between-network-administ
rator-and-network-manager
/
 https://
www.experts-exchange.com/questions/21144717/Difference-between-Network-Management-an
d-Network-Administration-Task.html
 https://www.techopedia.com
 https://www.algolsemantics.com/blog/importance-of-network-management/?
fbclid=IwAR1Z-9U5ngdAhpDwu4vPqLYyDcxCBI3mnoI4f_10_0Ar_lIPKDdkgJr-coI
 https://www.spiceworks.com/it-articles/network-management-tools/?
fbclid=IwAR0YcBpc54XEQ9LF80HpH6PWSAhvigUn-UtVm03SWG-DwDqailQIOUIy9Wk
Resources
 https://advergize.com/business/network-organizational-structure-examples-definition-adva
ntages-disadvantages/?
fbclid=IwAR0possi1CKpYuiUmZEHExrmtM-F84xx-uVVT2y7RhMR4VjhsAUYzhs24w
Y
 http://fiberbit.com.tw/types-of-network-management-services/?fbclid=IwAR0c_hx3w-nPH
ID22117dnNIkyJewhyhx5UBLnsyo04rF7sjQqea-6Cf_l8

Das könnte Ihnen auch gefallen