Вы находитесь на странице: 1из 17

153

Chapter 18
Network Management
Now that you have learned how to design and build networks, you can perform tasks such
as selecting, installing, and testing cable, as well as determining where wiring closets will
be located. However, network design and implementation are only part of what you must
know. You also must know how to maintain the network and keep it functioning at an
acceptable level. To do this, you must know how to troubleshoot. In addition, you must
know when it is necessary to expand or change the network’s configuration to meet the
changing demands placed on it.
Network management is composed of many different areas, including network
documentation, network security, network maintenance, server administration, and server
maintenance. This list is not exhaustive, but it is more than enough to cover at this time.
Each of the listed topics is just as important as the rest, and none of them should be
overlooked.
Many administrators think that, as soon as the network is up and running, their job is over.
This couldn’t be further from the truth. When a network setup is complete, the real job of
a network administrator starts. In this chapter, you learn about managing a network by
using techniques such as documenting, monitoring, and troubleshooting.

Documentation
The first, and most critical, component of a good network is documentation.
Documentation is the most-talked-about and least-performed task in a network.
Documentation represents the network administrator’s memory. The following documents
assist you in properly documenting your network.
154

Server and Workstation Configuration Details


Computer Hardware Configuration Worksheet

One Sheet Per Computer


File Server or Workstation:
Physical Location:
Make and Model:
Serial Number:
Company Invoice Number:
Removable Media Drives:
Manufacturer Drive Capacity Internal/ Internal Drive
Letter External Bay Number

Fixed Media Drives:


Manufacturer Drive Capacity Internal/ Internal Drive
Letter External Bay Number

Memory Current: Maximum:


Current/Maximum:
Peripheral Cards:
Manufacturer Model Type IRQ DMA Base Memory
Address

Network Interface Cards:


Manufacturer Node Address Model LAN Driver IRQ DMA Base Memory
Address

Comments:
155

Printer Configuration Worksheet

One Sheet Per Printer


Physical Location:
Make and Model:
Serial Number:
Company Invoice Number:
Printer ID Number:
Memory Current/Maximum: Current: Maximum:
Paper Bins Bin #1 Bin #2 Bin #3
Paper Type Paper Type Paper Type

Printer Configuration:
Serial Port Baud Stop Bits Parity Xon/X Interrupt
Rate off

Parallel Port Polling Interrupt

Network IP Polling MAC


Address Address

Print Queues:
Print Operators:
Comments:
156

Software Listings
Computer Software Configuration Worksheet

One Sheet Per Computer


Computer Invoice
Number:
Operating System(s):
Manufacturer: Version Service Network- Security
Updates Capable

Application Software:
Manufacturer: Version Service Network- Installation Data
Updates Capable Directory Directory

Maintenance Records
Computer Repair Worksheet

One Sheet Per Computer


Computer Invoice Date:
Number:
Type of Problem: Hardware Software
Problem
Description:

Warranty Coverage: Yes No Location of Repair:


Repair Description:

Department Charged:
Authorized By:
Repair Completed
By:
Comments:
157

Security Measures
Network Security Room Form
One Per Room
Physical Location: Date:
Physical Door Windows False Fire Locking
Security: Lock Ceiling Suppression Cabinets

Servers Tape
Backup:
Server Type Media Offsite Tape Set Start Day-
Name: Location Name of-Week
Server #1:
Server #2:
Server #3:
Authorized Name Department Function
Access:

Comments:
158

Network Security User Form


One Per User
Physical Location: Date:
Username: User ID:
Department: Department
Manager
Password
Length: Home
Directory:
Date ID Local Access:
Expires:
Access Print Access:
Hours:
Remote Administrative
Access: Access:
Inclusive Group Group Local/Global: Restrictions:
Groups: Name: Rights:

Network Duties/Privileges:

Comments:
159

Vocabulary Exercise
Define the following terms as completely as you can. Refer to Chapter 18 of the Cisco
Networking Academy Program CCNA 3 and 4 Companion Guide for help.
Back up operations The five types of back up operations are as follows:
1. Full backup
2. Incremental backup
3. Differential backup
4. Copy backup
5. Daily backup
Client/server The architecture of the relationship between a workstation and a server
in a network.
Costs of a network Network administration encompasses many responsibilities,
including cost analysis. This means determining not only the cost of network design and
implementation, but also the cost of maintaining, upgrading, and monitoring the network.
Determining the cost of network installation is not a particularly difficult task for most
network administrators. Equipment lists and costs can be readily established; labor costs
can be calculated using fixed rates. Unfortunately, the cost of building the network is just
the beginning.
Connection monitoring The process of users logging on to the network verifies that
connections are working properly, or the networking department will soon be contacted.
This is not the most efficient or preferable method of connection monitoring available,
however. Simple programs can enable the administrator to enter a list of host IP addresses
so that these addresses are periodically pinged. If a connection problem exists, the
program will alert the administrator by the ping output. This is an inefficient and primitive
way to monitor the network, but it is better than nothing.
Cut sheet diagrams A rough diagram indicating where cable runs are located and the
numbers of rooms they lead to.
Data recovery Data recovery, the second part of network security, involves protecting
data from loss. Multiple methods exist for this, and usually more than one method is used
at the same time to protect the data. As shown in, three popular data protection methods
are tape backup of data, fault-tolerant disk configurations, and the use of uninterruptible
power supplies (UPSs) to prevent equipment shutdowns during electrical power outages.
EMI (electromagnetic interference) Interference by electromagnetic signals that can
cause reduced data integrity and increased error rates on transmission channels.
Error report documentation This document is used to gather the basic information
necessary to identify and assign a network problem, and it also provides a way of tracking
the progress and eventual solution of the problem. Problem reports provide justification to
senior management for hiring new staff, purchasing equipment, and providing additional
training. This documentation also provides solutions to recurring problems that have
already been resolved.
160

Network access Access to network resources either on-site or off-site.


Network baseline, updates, and change verification To know when the network is
performing poorly, you must have a measurement to compare the performance against.
This measurement is called a baseline. A baseline is established after the network has been
installed and configured properly.
To establish a baseline, a network monitor package or tool, such as the Fluke LANMeter
or Windows NT Network Monitor program, can be used. These tools record several types
of network performance data, including network utilization percentage, collision counts,
frame errors, and broadcast traffic.
Network control A login account identifies the network user to the network system.
This account, along with the user’s password, identifies and gives access to the network
system’s resources. This account ID also holds the user responsible for actions on the
network. Just because the network user has an account does not mean that the network
resources are completely available to this user. User rights determine the user’s resource
availability.
Peer-to-peer network Also known as a workgroup network. It is designed for small
numbers of workstations; Microsoft recommends no more than 10 users in a peer-to-peer
network.
Power conditioning Protection of your equipment from irregularities in your building’s
electrical wiring. i.e.: Isolating transformer, Regulators, and Line conditioner
RAID 0 Stripes data across multiple disks, with no parity, so there is no redundancy.
RAID 1 Uses disk mirroring (disk duplexing) to write data to two identical partitions
on separate hard disks, thus creating an automatic backup. Disk duplexing uses two hard-
disk controller cards as well as two hard disks to prevent the controller card from being
the single point of failure for the system, as in disk mirroring.
RAID 2 Writes data across multiple hard disks, with error checking. This system is not
used anymore because it requires expensive disk modifications to work.
RAID 3 Stripes data 1 byte at a time and has a dedicated parity drive. This is a good
but expensive redundancy choice. Because of the expense, this solution is not sued very
often.
RAID 4 Stripes data one sector at a time and has a dedicated parity drive. This is an
expensive redundancy choice that is very slow writing data to the disk. Because of the
expense and the slowness of writing, this solution is not used very often.
RAID 5 Stripes data and parity across multiple disks (at least three for RAID 5). By
mixing the parity across all the disks, a separate parity disk is not required, and yet full
data redundancy is achieved. Data writes to the disk are still slow, but he cost isn’t so
high. One other important fact about RAID 5 is that on a Windows NT system, the boot
and system partitions cannot be located on a RAID 5 disk array.
Redundancy techniques A method of protecting data through fault-tolerant storage
devices. This is categorized by Redundant Array of Inexpensive Disks (RAID) levels 0 to
5.
161

RFI (radio frequency interference) Radio frequencies that create noise that interferes
with information being transmitted across unshielded copper cabling.
RMON (remote monitoring) MIB agent specification described in RFC 1271 that
defines functions for the remote monitoring of networked devices. The RMON
specification provides numerous monitoring, problem-detection, and reporting capabilities.
SNMP (Simple Network Management Protocol) Network management protocol
used almost exclusively in TCP/IP networks. SNMP provides a means to monitor and
control network devices, and to manage configurations, statistics collection, performance,
and security.
Software viruses A virus is a program that “infects” computer files (usually other
executable programs) by inserting copies of itself in those files. This is usually done in
such a manner that the copies will be executed when the file is loaded into memory,
allowing them to infect still other files, and so on. Viruses often have damaging side
effects, sometimes intentionally, sometimes not. The latest variation is to send these
viruses over the Internet as e-mail attachments.
Static, dust, dirt, and heat A cause of static is lack of humidity in the air, so it is
important to make sure that the rooms that hold equipment have proper temperature and
humidity control. Keep dust and dirt out of the keyboards, disk drives, and equipment air
vents. Keeping the environment in which equipment is used clean and free of contaminants
does this.
Don’t let the equipment overheat; computers and other network equipment have built-in
fans to cool them. Make sure not to block any of the equipment’s cooling vents, either.
Make sure that your work area leaves the computers vents open.
Traffic monitoring Traffic monitoring is a more sophisticated method of network
monitoring. It looks at the actual packet traffic on the network and generates reports
based on the network traffic. Programs such as Microsoft Windows NT Network Monitor
and Fluke’s Network Analyzer are examples of this type of software. These programs not
only detect failing equipment, but they also determine whether a component is overloaded
or poorly configured.

Focus Questions

1. What types of network documentation are needed to properly manage a


network?
Documentation includes, among other things, these components:
• Diagrams that indicate the path of the physical wiring layout
• The type of cable
• The length of each cable
• The type of termination for the cable
• The physical location of each wall plate or patch panel
• A labeling scheme for easy identification of each wire
162

1. Describe the benefits of network documentation.

Benefits of network documentation include the following:


• Less duplication of equipment, resources, and time
• Improved troubleshooting.
• Better security
• Fewer mistakes
2. Describe the major components of network security related to network
management.

Network security involves two major components. The first is keeping your
network safe from unauthorized access, and the second is ensuring your ability to
recover data from catastrophic events.
3. What environmental factors need be considered when managing a network?

Environmental factors need be considered when managing a network include the


following:
• Static electricity
• Dust
• Dirt
• Heat
• Humidity
163

4. Describe the administrator’s role in managing networks.

An administrator is responsible for, among other things, the following:


• Documentation
• Software listing
• Maintenance records
• Security
• Policies
• Data maintenance and recovery
5. Describe the scientific method for network troubleshooting.

Scientific Method (in general):


Step 1. Observe some aspect of the universe.
Step 2. Invent a theory that is consistent with what you have observed.

Step 3. Use the theory to make predictions.

Step 4. Test those predictions by experiments or further observations.

Step 5. Modify the theory in the light of your results.

Step 6. Go back to step 3.

Scientific Method for Troubleshooting:


Step 1. Identify the network/user problem.
Step 1. Gather data about the network/user problem.

Step 2. Analyze data to come up with a possible solution to the problem.

Step 3. Implement a solution to the network to attempt correction to the system.

Step 4. If the problem isn’t resolved, undo previous changes and modify the
data.

Step 5. Go back to step 3.


164

6. You are discussing network management with a customer. Outline the


presentation that you would give to the customer explaining network
management and how you intend to manage his/her network. Include a
script of your opening and closing paragraph.

Responses will vary for each student.


7. Why is the view of the network important?

A network is a collection of devices that interact with one another to provide


communication. When a network administrator looks at a network, it should be
looked at as a whole entity, not individual parts. In other words, each device in a
network affects other devices and the network as a whole.
8. Why is it necessary to monitor a network?

Although there are many reasons to monitor a network, the two primary reasons
are to predict changes for future growth and to detect unexpected changes in
network status. Unexpected changes might include things such as a router or
switch failing, a hacker trying to gain illegal access to the network, or a
communication link failure. Without the ability to monitor the network, an
administrator can only react to problems as they occur instead of preemptively
preventing these problems.
9. Describe problem solving as it relates to network troubleshooting.

The test of a good network administrator is the ability to analyze, troubleshoot,


and correct problems under pressure of a network failure that causes company
downtime.
10. Describe some troubleshooting methods.

Note taking can define a clear path to diagnosing a problem. It can tell you what
you have already tried and what effect that had on the problem. This can be
extremely valuable to the troubleshooter so that previous attempts at resolving the
problem won’t be needlessly repeated.
11. Describe the administrative side of managing networks.

A network is a collection of devices that interact with one another to provide


communication. When a network administrator looks at a network, it should be
looked at as a whole entity, not individual parts. In other words, each device in a
network affects other devices and the network as a whole.
165

12. Describe some software tools used for network troubleshooting.

Programs, such as Microsoft Windows NT Network Monitor and Fluke’s Network


Analyzer, are examples of this type of software. These programs not only detect
failing equipment, but they also determine whether a component is overloaded or
poorly configured. The drawback to this type of program is that it normally works
on a single segment at a time; if data needs to be gathered from other segments,
the monitoring software must be moved to that segment.
166

CCNA Exam Review Questions


The following questions help you review for the CCNA exam. The answers appear in
Appendix A, “Answers to CCNA Exam Review Questions.”
1. What type of backup saves only the files that were modified on the same day
as the backup operation?

a. Full backup
b. Incremental backup
c. Copy backup
d. Differential backup
13. Raid 1 features what type of disk redundancy?

a. Disk striping
b. Disk backup
c. Disk duplexing
d. No redundancy
14. A network baseline is the comparison value to measure what about a
network?

a. Security
b. Design
c. Structure
d. Performance
15. A peer-to-peer network establishes what type of relationship between end
stations?

a. Client to client
b. Client to server
c. Server to server
d. Server to Internet
16. Which type of file system does Windows NT use for security purposes?

a. Fat 16
b. Fat 32
c. NTFS
d. NFS

17. A document that shows the physical layout of a building’s network wiring is
called what?

a. Cut sheet
b. Layout diagram
c. Floor plan
d. Access list

18. What is the minimum number of drives required for RAID 5?


167

a. 1
b. 2
c. 3
d. 4
19. In a client/server network, the ability of a user to access certain files while not
being able to access other files are called the user what?

a. Accesses
b. Rights
c. Abilities
d. Securities
20. What is the IP address of the internal loopback?

a. 10.10.10.1
b. 255.255.255.0
c. 127.0.0.1
d. 192.0.0.1
21. What is one way to prevent static electricity damage?

a. Turn off the electricity when working on the computer.


b. Wear rubber gloves to insulate the equipment.
c. Use only plastic tools.
d. Use a grounding strap.

22. Which protocol listed supports network management?

a. SMTP
b. NFS
c. SNMP
d. FTP
e. IPX

23. To list your IP setting on a Windows NT computer, you would run the
________ command.

a. IP
b. IPCONFIG
c. WINIPCFG
d. SHOW IP
e. CONFIG
24. Which of the following is a troubleshooting method used in network
troubleshooting?

a. Loopback readout
b. Divide and conquer
168

c. Ping of death test


d. Trace the fault
e. Reset the server
25. If the server is set up using the Internet Protocol, the clients must use which
protocol to communicate with it?

a. IPX
b. UDP
c. IP
d. Telnet
e. HTTP
26. What is the most basic form of connection monitoring?

a. WINIPCFG
b. Tracert
c. NetMonitor
d. LanMeter
e. Logging on
27. RMON is an extension of what protocol?

a. SNMP
b. UDP
c. IPX
d. PING
e. SMTP

28. What does the -n protocol option stands for in the ping command?

a. The network number of the ping area


b. The no repeat option
c. Count – number of pings
d. Never stop until interrupted
e. Nothing
29. How is the remote data gathered with RMON?

a. Commands
b. Tables
c. Lists
d. Probes
e. User interaction
30. The cost of _______ equipment for mission-critical operations needs to be
added to the cost of maintaining the network.
169

a. Redundant
b. Expensive
c. Mechanical
d. Security
e. Welding

Вам также может понравиться