Business Network Management I Lecture 1 PDF

Summary

This lecture provides an overview of Business Network Management, focusing on key concepts such as fault management, configuration management, performance management, and security management. It details various components including network management platforms and troubleshooting infrastructure, and highlights the importance of monitoring and measuring network performance. This lecture is useful for professionals in IT and network administration.

Full Transcript

Business Network Management I Lecture 1 What is Network Management? refers to the activities, methods, procedures and the use of tools to administrate, operate, monitor, maintain and provision of networked systems. Network Management Model: ISO network management model has five funct...

Business Network Management I Lecture 1 What is Network Management? refers to the activities, methods, procedures and the use of tools to administrate, operate, monitor, maintain and provision of networked systems. Network Management Model: ISO network management model has five functional areas which are: 1. Fault management 2. Configuration management 3. Performance management 4. Security management 5. Accounting management Fault management: Goal of fault management is to detect, log, notify users of and automatically fix problems to keep the network running effectively. Fault management 1. Network management platforms 2. Troubleshooting infrastructure 3. Fault detection and notification 4. Proactive fault monitoring and notification 1) Network management platform A network management platform deployed in the enterprise manages an infrastructure that consists of multivendor network elements. The following commonly available functions are included in a standard management platform: Network discovery Topology mapping of network elements Event handler Performance data collector and grapher Management data browser 2) Troubleshooting Infrastructure Trivial File Transfer Protocol (TFTP) and system log (syslog) servers are crucial components of a troubleshooting infrastructure in network operations. The TFTP server is used primarily for storing configuration files and software images for network devices. Routers and switches can send system log messages to a syslog server. The messages facilitate the troubleshooting function when problems are encountered. 3) Fault Detection and Notification Network devices are capable of alerting management stations when a fault occurs on the systems. Fault detection is accomplished when the devices send SNMP trap messages, SNMP polling, and syslog messages. A management system alerts the end user when a fault is reported, and corrective actions can be taken. 4) Proactive Fault Monitoring and Notification Normally, a management station performs polling on network devices to determine the status or value of certain variables. For example, a management station polls a router to find out the central processing unit (CPU) utilization and generate an event when the value hits reaches a configured threshold. Configuration Management The goal of configuration management is to monitor network and system configuration information so that the effects on network operation of various versions of hardware and software elements can be tracked and managed. Configuration management Configuration Standards Configuration File Management Inventory Management Software Management Configuration Management 1) Configuration Standards With an increasing number of network devices deployed, it is critical to be able to accurately identify the location of a network device. This location information should provide with detailed description when a network problem occurs. 2) Configuration File Management When you add new configuration commands on existing network devices needs, you must verify the commands for integrity before actual implementation takes place. An improperly configured network device can have a disastrous effect on network connectivity and performance. Configuration command parameters must be checked to avoid mismatches or incompatibility issues. Configuration Management 3) Inventory Management The discovery function of most network management platforms is intended to provide a dynamic listing of devices found in the network. An inventory database provides detailed configuration information on network devices. Common information includes models of hardware, installed modules, software images and so on. All these pieces of information are crucial in completing tasks such as software and hardware maintenance. 4) Software Management Changes to software in network devices should be tracked to assist in the analysis phase when another software maintenance is required. With a modification history report readily available, the person performing the upgrade can minimize the risk of loading incompatible images or microcode into network devices. Performance Management The Goal of Performance Management Monitor and measure various aspects of performance so that overall performance can be maintained at an acceptable level. Performance Manage Service Level Agreement Performance Monitoring, Measurement, and Reporting Performance Analysis and Tuning Performance Management 1) Service Level Agreement: A service level agreement (SLA) is a written agreement between a service provider and their customers on the expected performance level of network services. The SLA consists of metrics agreed upon between the provider and its customers. The values set for the metrics must be realistic, meaningful, and measurable for both parties. 2) Performance Monitoring, Measurement, and Reporting: Different performance metrics at the interface, device, and protocol levels should be collected on a regular basis. The polling engine in a network management system can be utilized for data collection purposes. Most network management systems can collect, storing, and presenting polled data. Performance Management 3) Performance Analysis and Tuning: User traffic has increased significantly and has placed a higher demand on network resources. Network managers typically have a limited view on the types of traffic running in the network. User and application traffic profiling provides a detailed view of the traffic in the network. Security Management The goal of security management is to control access to network resources and Provide access to network devices and corporate resources to authorized individuals. Security management Authentication Authorization Accounting Security Management 1) Authentication Authentication is the process of identifying users, including login and password dialog, challenge and response, and messaging support. Authentication is the way a user is identified prior to being allowed access to the router or switch. There is a fundamental relationship between authentication and authorization. The more authorization privileges a user receives, the stronger the authentication should be. 2) Authorization Authorization provides remote access control, including one-time authorization and authorization for each service that is requested by the user. Security Management 3) Accounting Accounting allows for the collecting and sending of security information used for billing, auditing, and reporting, such as user identities, start and stop times, and executed commands. Accounting enables network managers to track the services that users are accessing as well as the amount of network resources they are consuming. Accounting Management Accounting management is the process used to measure network utilization parameters so that individual or group users on the network can be regulated appropriately for the purposes of accounting. Accounting Management NetFlow Activation and Data Collection Strategy Configure IP Accounting Accounting Management 1) NetFlow Activation and Data Collection Strategy NetFlow (network flow) is an input side-measurement technology that allows for capturing the data required for network planning, monitoring, and accounting applications. 2) Configure IP Accounting Cisco IP accounting support provides basic IP accounting functions. By enabling IP accounting, users can see the number of bytes and packets switched Between a source and destination IP address basis.

Use Quizgecko on...
Browser
Browser