You are on page 1of 71

TO NETWORK ADMINISTRATION

Concepts and Practice of Modern


Network Management
Course Information
COURSE INSTRUCTOR: J K Alwala, Department of Computer Science, School of
Computing and Informatics, cell phone 0726906954/0734882170, email:
alwala@maseno.ac.ke/jokalwala@gmail.com
LECTURES/LABS
Lectures: Mondays 7 am to 9 am (SCS 329); 11 am to 1 pm (CCS 315) first lectures May 5, 2014.
LAB Sessions: Schedule to be announced.
EXAMS AND ASSESSMENTS
CAT#1, 2 pm to 3.30 pm, June 2, 2014.(CCS 315); June 3, 2 pm to 3.30 pm(SCS 329) Maximum score
10 %.
CAT#2, 2 pm to 3.30 pm, July 1, 2014. (CCS 315); July 2, 2 pm to 3.30 pm(SCS 329) Maximum score 10
%.
Lab exercises reports, continuous, maximum score 10%
Semester exams, 2 hours, maximum score 70%. Date TBA.
REFERENCES
TCP/IP Protocol Suite, 4
th
edition, Forouzan
Computer Networks, 4
th
edition, A Tanenbaum
Windows server 2008: TCP/IP Fundementals for Windows (.pdf)
Linux Network Administrator's Guide, 2nd Edition,Olaf and Dawson
LABS AND ASSIGNMENT MATERIALS (ATTACHMENTS)
Case Study: read and answer questions at end of the chapter. Submit by July 25, 2014.
Lab exercises: Labs 1 to 4. Submission dates to be announced. (see Labs _2041mayfolder
attached)
Study the Wireshark tutorial i8n the attachment



Course Topics
PART ONE: NETWORK ADMIN. AND MANAGEMENT BASICS
Introduction to Network Administration and Management WK1
Network management components and Performance metric WK2
Introduction to Simple Network Management Protocol (SNMP) WK3
PART TWO: TCP/IP NETWORK ADMINISTRATION
The TCP/IP Protocol suite : Overview of protocol structure and
components WK 4
Management of Ethernet LANS WK5
Management of WLANs WK6
Management of WANs and Internet Connectivity WK7
Admin. TCP/IP Based Services: HTTP, Telnet, DNS, and DHCP WK8
Administering Network Security and Recovery WK9
Troubleshooting of Networks. WK 10

Introduction
Networks are made up of a very wide range of devices, technologies and
software components
Computer networks are heterogeneous in hardware and software.
Network components can be broadly classified as:
Hardware
Software
All the components must be carefully selected and installed/implemented in
the right infrastructural environment.
The environment has a critical influence on the overall performance of the
network.
To ensure all issues are considered and built into the network, an appropriate
life cycle should be adopted.
At inception, networks require planning.
After planning comes deploymentnew equipment needs to be installed
and properly turned up.
Only then do regular operations ensue.
As the network matures, upgrades must be planned and performed.
Finally, equipment must be decommissioned and network traffic cut over
to new equipment or to a new generation of networking technology.
The Case For Network Management
Case for NM
The Case for NM
ROI Example (Using Mgt Tools)
Network Manager Responsibilities
Network management refers to the activities, methods, procedures,
and tools that pertain to the operation, administration,
maintenance, and provisioning of networked systems.
Thus a network manager has a number of broad
responsibilities
Ensure that the users of a network receive the information
technology services with the quality of service that they expect
Strategic and tactical planning of the engineering, operations,
and maintenance of a network and network services
Help network engineers deal with the complexity of a data
network and to make sure that data can go across it with
maximum efficiency and transparency to the users
Network Management Definition
Network Management Definition
Network Management Functions
12
NM Functions
Broader Definition of NM
Distinction is made among the management of:
The networks themselves,
The end systems that are connected to networks, and
(networked) applications running on the systems connected to the networks.
This distinction separates the terms network management, systems management, and
application management
Significance of NM
A key factor for the economic success of businesses, whether
services providers or businesses that run own networks
Consumers may chooses between Service Providers on a number
of issues:
Who can operate the network at the lowest cost and pass those cost
savings on to customers?
Who provides better customer experience by making it easy to order
communication services and service those orders with minimal
turnaround time?
Who can maintain and guarantee the highest quality of service?
Who can roll out services fast and efficiently?
For enterprises running own networks:
Cost savings in operating the network benefit the enterprise that the
network serves;
fast turnaround time to deploy new services, and
maintain a high quality of service
These can translate into important competitive advantages

Benefits of NM: COST
Several benefits accrue from NM, grouped as reduced cost,
improved QoS and increased revenue.
Cost: one of the main goals of NM is to Reduce and minimize Total
Cost of Ownership (TCO).
NM can help improve efficiency:
Use of Network testing and troubleshooting
tools, enabling operators to more quickly
identify and isolate problems and thereby
free themselves up for other tasks.
Systems that facilitate turn-up of services
and automate provisioning.
fewer operational steps must be
performed by an operator.
reduces the potential for human error.
Reducing required maintenance skill level.
Performance-reporting tools and bottleneck
analysis.
Enables service providers to allocate
network resources to where they are
needed most, minimizing the required
investment in the network and maximizing
the bang for the buck.
NM Benefits: Quality 1
Quality of the communications and networking
services that are provided.
This includes properties such as the bandwidth that is
effectively available, or the delay in the network,
which, in turn, is a factor in the responsiveness a user
experiences when using services over a network.
Quality also includes the reliability and the availability
of a communications service, typically associated only
with the network itself
Developing network equipment with redundant hardware so
that if a component fails, a hot failover to a spare can occur
Networks carefully engineered to allow for redundant
communication paths, in many cases ensuring network
availability that is overall higher than the availability of any
single element in the network
Intelligent capabilities are introduced to automatically
reroute communication traffic around faults or fiber cuts

NM Benefits: Quality II
Quality can be assured through
Systems for the end-to-end provisioning of a service automate many of
the steps that need to be performed to configure the devices in the
network properly
Performance trend analysis can help network managers detect potential
network bottlenecks and take preventive maintenance action before
problems occur and before services and users are negatively impacted
Alarm correlation capabilities enable faster identification of the root
cause of observed failures when they occur, minimizing the time of
actual outages
Quality impact hard to quantify. Can use opportunity cost:
Lost revenue from customers taking their business elsewhere if quality
objectives are not met.
Increased networking cost from inefficient utilization or networking
resources, leads to more networking equipment and capacity being
deployed to support a certain level of service than would otherwise be
necessary
Higher operational cost that is spent on fixing problems and having to
monitor additional equipment that would not be necessary if quality
would meet required levels and existing equipment were better utilized
NM Benefits: REVENUE
NM can also be a revenue enabler that opens up
market opportunities that would not exist without it.
Examples:
Service provisioning systems enable service providers to
reduce the time that elapses from the time a service is
ordered to the time the service is actually turned up.
Quickly translates into quicker time to revenue generation.
In some cases, NM enables a service provider to augment
a service offering with management-related capabilities
that attract more customers.
E.g.,the capability of a customer to track accounting charges online
and to configure service features over the Web (examples for
voice: caller ID, follow-me services) and have them take effect
immediately constitutes a valuable service feature.
Cost savings made possible through NM might make
certain services feasible in the first place
Users of NM
Many different players are concerned with different aspects of NM, depending on their
particular perspective.
The Service Provider (SP):
Any communication and networking
service, such as telecommunication
services (telephone, voice mail) and data
services (leased lines, Internet
connectivity)..TSPs and ISPs
Application Services Providers (ASPs)
Enterprise IT departments are in charge of running the network inside an enterprise, providing
the enterprise with all its internal communication needs. Consideration include:
A cost center, so the focus is on how to provide the communication services the enterprise
needs at the lowest cost possible.
IT departments have one customer: the enterprise. End users within the enterprise have
no choice in who provides their service.
IT departments might be forced to outsource much of their operations to a service
provider (then called a managed service provider), to minimize distraction for the
enterprise from their core business.
End users, often refers to users who keep the network running or network managers
Rely on NM systems and applications.
Include network admin for router configuration and tuning: engineers, technicians,
helpdesk support staff, network planners
NM Providers
Includes Equipment Vendor, 3
rd
Party Application Vendor
and the Systems Integrator.
Equipments vendor: Primarily in the business of selling
networking equipment, not NM applications.
Hence, traditionally have shown a tendency to limit investment in NM
application development
But modern-day equipment vendors are paying increasing attention
to NM.
This includes management applications made available for the equipment,
e.g., basic management software might come bundled with the equipment
Third Party Applications Vendor: provide NM features for a
wide range of products and to details above those provided by
equipment vendors.
Vendor independent or multivendor support
The Systems Integrator: provides services to integrate a set of
management applications with a specific network and
operations support environment, often plugging functional gaps
and providing interface adaptations that might be necessary to
turn a set of independent applications into a turnkey solution
that is customized for a specific network provider.
Performs a customer-tailored development
Communicating with the Network
Methods of Communicating with the
Network
Basic Communication Models: 2-tier
2-tier Communication Model 2-tier Comm Model Example
3-Tier Comm. Model
NM FRAMEWORKS
Section Two
FCAPS Framework
Two frameworks exist that can be used to model Network management: FCAPS ,
ITIL, and TMN
Either framework can help one evaluate management tools and define network management
tasks in a given situation.
FCAPS (fault-management, configuration, accounting, performance, and security)
is an acronym for a categorical model of the working objectives of network
management.
Addresses the network management applications that reside upon the NMS
There are five levels: in FCAPS
FFault management: At the F level, network problems are found and corrected. Potential
future problems are identified, and steps are taken to prevent them from occurring or
recurring. In this way, the network is kept operational, and downtime is minimized.
CConfiguration: At the C level, network operation is monitored and controlled. Hardware
and programming changes, including the addition of new equipment and programs,
modification of existing systems, and removal of obsolete systems and programs, are
coordinated. An inventory of equipment and programs is kept and updated regularly.
AAccounting: The A level, which might also be called the allocation level, is devoted to
distributing resources optimally and fairly among network subscribers. This makes the most
effective use of the systems available, minimizing the cost of operation. This level is also
responsible for ensuring that users are billed appropriately.
PPerformance: The P level is involved with managing the overall performance of the
network. Throughput is maximized, bottlenecks are avoided, and potential problems are
identified. A major part of the effort is to identify which improvements will yield the greatest
overall performance enhancement.
SSecurity: At the S level, the network is protected against hackers, unauthorized users,
and physical or electronic sabotage. Confidentiality of user information is maintained where
necessary or warranted. The security systems also allow network administrators to control
what each individual authorized user can (and cannot) do with the system.
ITIL Framework
ITIL (The Information Technology Infrastructure Library) was designed to provide a better
framework to deliver high-quality, consistent application delivery over a network infrastructure.
FCAPS framework is a model for defining the objectives of network management, ITIL framework is a best
practice model aligned with IT organizational structure. It builds on the FCAPS model.
A set of practices for IT Service Management (ITSM) that focusses on aligning IT services with the
needs of an organization
ITIL framework adapts to the organizations environments to provide quality assurances toward
providing better network management practices.
These practices include a framework for application, service, and security management.
Application management:
Designed to ensure that an application has the right configuration and design to be implemented in the
environment.
can cover many various aspects of network management, from number of application dependencies to
delay timers for satellite links.
Application management is designed to ensure that the application, end-to-end, is fully enabled to provide
the service and delivery to the end users.
Software asset management:
Software asset management is designed to be partially configuration management as it provides essential
information about the software installed on each device, its revision or platform level, and how many
instances are required.
Accounting for proper licensing and software maintenance is a big business with many larger IT
organizations.
ITIL Components
ITIL (2011) comprises five volomes:
ITIL Service Strategy: understands organizational
objectives and customer needs
ITIL service Design: turns service strategy into a plan
for delivering the business objective
ITIL Service Transition: develops and improves
capabilities for introducing new services into
supported environments
ITIL Service Operation: manages services in supported
environments
ITIL Continual Service Improvement: achieves service
incremental and large-scale improvements

ITIL Framework
Service support: (typically a network operations center (NOC) in most
organizations.)
The service support discipline is focused on ensuring that the end users have
access to the applications that they require.
Focuses on aspects of troubleshooting, help desk, and supporting new
applications over the network.
Underlying disciplines for service support include problem management,
configuration management, and change management.
Problem management would track the number of incidents and facilitate
troubleshooting of faults or performance problems that occur in the
environment.
To troubleshoot a network environment, a good understanding of what
devices are on the network and their configuration is handled by the
configuration management (often referred to as configuration management
database (CMDB)).
Change management also involves both aspects of problem management and
configuration management
Efficient service support would include the ability to create a process for troubleshooting
and escalation to higher level engineers, PC and client PC installations, and access to
other aspects of the organization that are responsible for implementation and design of
the network among other duties.
ITIL Framework
Service delivery.
Consists of ensuring that as applications are flowing across the network, they
are being delivered consistently.
This discipline includes capacity management and application modeling.
Service level objectives and agreements are the key metrics used to
distinguish how well an application is being delivered to end users.
Security management:
Key traditional characteristics in ensuring that external threats are mitigated
with firewalls and access prevention.
Also includes proper configuration management of rights and permissions of
users to ensure that unauthorized access is not granted to end users.
An area of focus to ensure that unauthorized or unintended access of sensitive
application data is not obtained.
Infrastructure management
Infrastructure management is responsible for the installation and physical
configuration of all network devices in the organization.
When changes are approved by the change teams, infrastructure teams are
the army that enforces these changes and does all of the heavy lifting based
on the designs by other architects and engineers.
TMN Model
ITU-T protocol Model for managing open systems in a communications
network.
Framework for achieving interconnectivity and communications across
heterogeneous operationss system and comm networks.
Defines set of interface points for elements which perform actual
communications processing to be accessed by elements to monitor and
control them
For communication between operations systems and Network Elements (NEs)
it uses the Commomn Management Information Protocol (CMIP)
The fundemental layered software used in ISDN, ATM, SDH/SONET, and GSM.
TMN Architectural tructure:
Functional architecture
Physical architecure
Security architecture
Logical layered architecture
Four Logical Layers:
Business Management
Service Management
Network management
Element managementki
TMN Model
TMN (Telecommunications Management Network) refers to a set of
standards by the International Telecommunications Union (ITU-T)
The TMN hierarchy, a reference model that specifies a set of management
layers that build on top of each other and address different abstractions of the
management space
Five layers: business management (top), service management, network
management, element management, and network element (bottom).
Element Management layer
Involves managing the individual devices in the network and keeping them
running. Includes functions to:
view and change a network elements configuration,
monitor alarm messages emitted from elements in the network, and
Instruct network elements to run self-tests.
Network Element- The management
agent, in effect.
involved with the management functionality
that the network element itself supports,
independent of any management system.
is at the bottom of the management
hierarchy; everything else builds on top of it.
TMN Model Layers
Network Management Layer
Involves managing relationships and dependencies
between network elements, to maintain end-to-end
connectivity of the network.
It offers the concept of a forest, as opposed to individual
trees
It is concerned with keeping the network running as a whole.
In contrast with network element mgt, which does not deal with ensuring
overall network integrity.
Monitoring tasks at the network management layer involves
ensuring that data flows across the network and reaches its
destination with acceptable throughput and delay
The network management layer makes use of functionality
provided by the element management layer, providing
additional functions on top.
TMN Model Layers
Service management is concerned with managing the services that the
network provides and ensuring that those services are running smoothly
and functioning as intended.
For example, when a customer orders a service, the service needs to be
turned up, with all the accompanying task providers
Help-desk, troubleshooting, etc.
Services range from the basicsuch as providing simple data connectivity or
telephony serviceto the more sophisticatedsuch as hosting large-scale
enterprise websites that require balancing of load across servers and
transparent setup of virtual LANs.
Service management tasks build on functionality that is provided by the
network management layer underneath and provide additional value on top,
applying them to the context of managing a service.
Business Management Layer
Deals with managing the business associated with providing services and all
the required support functions.
This includes topics as diverse as billing and invoicing, helpdesk management, business
forecasting, and many more.
The Hierarchical Model Overview
NM FUNCTIONAL DESCRIPTION
Section Five
FAULT MANAGEMENT (F)
Fault management deals with faults that occur in the network, such
as equipment or software failures, as well as communication
services that fail to work properly.
Fault management is therefore concerned with monitoring the
network to ensure that everything is running smoothly and reacting
when this is not the case.
Effective fault management is critical to ensure that users do not
experience disruption of service and that when they do, disruption is
kept to a minimum.
Fault management functionality includes but is not limited to the
following:
Network monitoring, including basic alarm management as well as
more advanced alarm processing functions
Fault diagnosis, root cause analysis, and troubleshooting
Maintaining historical alarm logs
Trouble ticketing
Proactive fault management
F: Fault Management
Steps for successful fault management:
Identify the problem by gathering information about the state of the network
(polling and trap generation)
Restore any services that have been lost
Isolate the cause and decide if the fault should be managed
Correct the fault if possible
F- Monitoring Overview
Network monitoring includes functions that allow a
network provider organization to see whether the network
is operating as expected, to keep track of its current state,
and to visualize that state.
This functionality is fundamental to being able to recognize and
react to fault conditions in the network as they occur.
The most important aspect of network monitoring concerns the
management of alarms.
Alarms are unsolicited messages from the network that indicate that
some unexpected event has occurred, which in some cases requires
operator intervention.
Alarm management includes many functions that we classify
into basic functions:
such as alarm collection, and
visualization
More advanced functions that involve processing alarms to
perform filtering and correlation tasks.
Alarm Visualization
Visualization can occur simply through textual lists.
Each alarm results in an entry in the list, containing
information about the alarm.
Those lists can be searched, sorted, and filtered according to many
different criteria, such as alarm severity, the type of alarm, the
network element (or range of network elements) affected, the
type of network element affected, the time of day when the alarm
occurred, and many more.
Topology Maps
Icons and lines on the map represent devices and links and
can be animated to indicate the current alarm state.
Icons and the lines can be animated with different colors to
indicate the severity of the alarm:
red might be used for devices on the map with a critical alarm, orange for
major alarms, yellow for minor alarms, and green for no alarms. Gray
might be used to indicate lost management connectivity to the device.
Alarm Visualization
Maintaining Alarm Historical Data
Historical alarm data is not required for
monitoring the network but is useful in many
other ways.
Examples
Historical alarm data can be mined to help with future
diagnosis and .Basically, this can be helpful to identify alarm
patterns that have occurred in similar form on past
occasions.
It can be used to establish trends, to see how alarm rates
and types of alarms reported have evolved over time.
It can be analyzed in conjunction with other historical data,
such as changes that have been performed on the
networkfor example, the introduction of new network
elementsand its impact on historical alarm patterns, or
correlation of alarms with certain usage patterns of the
network.
Configuration Management
CM is at the core of network management in general.
Includes functionality to perform operations that will deliver and
modify configuration settings to equipment in the network.
This includes the initial configuration of a device to bring it upthat is,
to be properly connected to the networkas well as ongoing
configuration changes.
There is also need to keep track of what configurations have been
done in the network
CM involves several distinct activities:
Configuring managed resources, whether they are network equipment
or services running over the network
Auditing the network and discovering whats in it
Synchronizing management information in the network with
management information in management applications
Backing up network configuration and restoring it in case of failures
Managing software images running on network equipment
Configuration Management
Steps for successful configuration management:
Gather current network configuration (either manually or automatically)
Use that data to modify network device configuration in order to provision
the network
Store the configuration data and maintain an up-to date inventory of all
network components
Produce various inventory reports
Accounts Management
All about the functions that allow organizations
to collect revenue and get credit for the
communication services they provide, and to
keep track of their use.
It is hence at the core of the economics of providing
communications services
Accounting need be done for service
consumption:
In general, usage data is based on volume, duration,
and/or quality.
Examples of accounting measures are megabytes of data
traffic, minutes of phone calls, number of service
transactions, and use of premium or guaranteed services
versus best-effort services
Accounts Management
Address the different steps involved for accounting management:
Gather network resource utilization information
Use metrics to set usage quotas
Billing users for their network use
Consider the cost of accounting
Performance Management
Steps for successful performance management
Collect data on current network link and device utilization
Baseline the utilization metrics and isolate any existing performance
problems
Set utilization thresholds based on the baseline
Analyze the historical data for recognizing trends
Resource planning and tuning
Remember Measuring performance impacts performance
Performance Management
Performance of networks is characterized by a multitude of performance
characteristics, measured according to metrics. Some examples of
performance metrics are these:
Throughput, measured by a number of units of communication performed per
unit of time.
The units of communication depend on the layer, type of network, and networking
service in question. Examples are as follows:
At the link layer, the number of bytes, or octets, that are transmitted per second
At the network layer, the number of packets that are routed per second
At the application layer for a web service, the number of web requests that are serviced per
second
At the application layer for a voice service, the number of voice calls, or call attempts, that can
be processed per hour
Utilization: a relative number that expresses throughput as a percentage of
the theoretical maximum capacity of the underlying system.
Delay, measured in a unit of time, metrics being layer or networking service
dependent:
At the link layer, the time that it takes for an octet that is transmitted to reach its
destination at the other end of the line
At the network layer, the time that it takes for an IP packet to reach its destination
At the application layer for a web service, the time that it takes for a request to reach its
destination at the host servicing the request after the request has been issued
At the application layer for a voice service, the time it takes to receive a dial tone after
you have lifted the receiver

Performance Management
Quality is in many ways also performance related
and can be measured differently, depending on
the networking service
At the link layer, the number or percentage of seconds
during which errors in transmission occurred
At the network layer, the number or percentage of
packets dropped
At the application layer for a web service, the number
or percentage of web requests that could not be
serviced
At the application layer for a voice service, the
number or percentage of voice calls that were
dropped or abnormally terminated
Performance Management
Monitoring and Tuning: Includes a wide variety
of functions.
At the most basic level, you want to be able to
retrieve a snapshot of the current performance:
packet counters, delay measures, and gauges that
indicate utilization percentages.
Help detect trends and bottlenecks
Collecting performance data
Periodic snapshots need to be taken and stored in a
file system or database.
Based on protocols and automated tools, over specified
periods.
Security Management (S)
Steps for successful security management:
Identify sensitive information or devices
Find the access points
Secure the access points
Protect the sensitive information by configuring encryption policies
Implement a network intrusion detection
scheme to enhance perimeter security
Security Maanagement
Related to securing a network from threats, such as hacker attacks,
the spread of worms and viruses, and malicious intrusion attempts.
Two aspects need to be distinguished:
security of management, which ensures that the management itself is secure,
and
management of security, which manages the security of the network.
For example, access to the management
interfaces of the devices in the network
needs to be secured to prevent
unauthorized changes to network
configurations.
The management network needs to be
secured to prevent disruption to
management traffic.
Requiress securing applications as well
Maintaining tamper-proof security audit trails that record any management
operations that are performed on the network.
Protection against iternal threats is generally more difficult.
Security Management: essential tasks
Foolowing tasks ensure an effective security management
Set up proper processes and procedures to ensure orderly operations
Assign access privileges only to those who actually need these privileges for
their immediate job function
Require secure passwords that cannot easily be cracked
Require that passwords be changed at regular intervals
Establish audit trails, themselves secured properly
Set up proper facilities for backup and restore of critical management data
Management of security itself is critical, against common security threats
Hacker attacks of individuals who try to obtain improper control of a system
that is connected to the network.
Denial-of-service (DOS) attacks that try to overload portions of a network by
generating illegitimate traffic, preventing legitimate network traffic from
getting through.
A variant is distributed denial-of-service (DDOS) attacks, which coordinate those attacks
from multiple sources, making them harder to defend against.
Viruses and worms that attempt to corrupt and possibly destroy systems along
with their file systems, which are connected to the network or which are
network devices themselves.
Related to this are Trojan horses, malicious code that masquerades as a useful and
innocent program that, when opened by a user, can wreak havoc.
Spam, also considered a security problem because its volume can overwhelm
a network and its servers.
Management of Security
Management of security involves other functions:
Intrusion detection involves monitoring traffic on the network to detect
suspicious traffic patterns that could indicate an ongoing attack.
One technique that can help guard against the spread of viruses involves inspecting
traffic payload to see what is carried inside it, and then discarding or marking content
that is apparently intended to compromise the networks security. Methods that involve
inspection can sometimes be ineffective, however, because in
Applying policies that limit or allow to only gradually increase the amount of
traffic that is geared toward a particular destination or that originates from a
particular source.
The capability to blacklist ports and network addresses at which suspicious
traffic patterns are observed and through which suspected offenders may
enter the network.
Those ports and addresses can be put under additional scrutiny and monitored for
suspicious activity so that they can be quickly shut down if an attack is suspected.
incorporating honey pot, a piece of equipment or a host system that
appears to be a part of the regular network but is actually isolated and
specially secured. It serves as a trap.
Because the honey pot is not an actual part of the production network, any traffic that is
directed at the honey pot can with reasonable certainty be regarded as malicious.
Network Operating Centre (NOC)
Where it all happens
Coordination of tasks
Status of network and services
Fielding of network-related incidents and complaints
Where the tools reside (NOC server)
Documentation including:
Network diagrams
database/flat file of each port on each switch
Network description
Much more .
The Big Picture
Growing Complexity of Networks
Our digital world is changing
Information must be accessed
from anywhere in the world
Networks must be secure,
reliable, and highly available

Elements Of A Converged Network
Collaboration is a requirement
To support collaboration,
networks employ converged
solutions
Data services such as voice
systems, IP phones, voice
gateways, video support, and
video conferencing
Call control, voice messaging,
mobility and automated
attendant are also common
features
Elements Of A Converged Network
Benefits of Converged
Networks include:
Multiple types of traffic;
Only one network to
manage
Substantial savings over
installation and
management of separate
voice, video and data
networks
Integrates IT management

Borderless Switched Networks
Cisco Borderless Network is a network
architecture that allow organizations to
connect anyone, anywhere, anytime, and on
any device securely, reliably, and seamlessly
It is designed to address IT and business
challenges, such as supporting the
converged network and changing work
patterns
Hierarchy in the Borderless Switched Network
Borderless switched
network design
guidelines are built
upon the following
principles:
Hierarchical
Modularity
Resiliency
Flexibility

Evolving IT Challenges
Some of the top trends include:
Bring Your Own Device (BYOD)
Online collaboration
Video communication
Cloud computing

Emerging Enterprise Architectures
Cisco Borderless Networks
Collaboration Architecture
Ciscos collaboration architecture is
composed of three layers:
Application and Devices Unified
communications and conference
applications, such as Cisco WebEx
Meetings, WebEx Social, Cisco
Jabber, and TelePresence.
Collaboration Services Supports
collaboration applications.
Network and Computer
Infrastructure Allows
collaboration anytime, from
anywhere, on any device.


Data Center and Virtualization
The data center architecture consists of three components:
Cisco Unified Management Solutions Simplifies and automates the
process of deploying IT infrastructure and services with speed and
enterprise reliability.
Unified Fabric Solutions Delivers network services to servers, storage,
and applications, providing transparent convergence, and scalability.
Unified Computing Solutions Ciscos next-generation data center system
unites computing, network, storage access, and virtualization into a
cohesive system designed to reduce total cost of ownership (TCO).

Summary I
NM is about running and monitoring networks.
NM plays a significant role in saving cost, making operation of a
network more efficient, and ensuring effective use of resources in
the network.
Different players have an interest in network management for
different reasons, and therefore approach it from slightly different
angles
Many of the NM challenges are of a technical nature and relate to
the fact that management applications tend to be complex systems
with stringent requirements in terms of scale, robustness,
extensibility, and maintainability.
Fault management consists of functions to monitor the network to
ensure that everything is working properly.
Dealing with alarms and the large volume of events that are constantly
being generated is one of the challenges that fault management
addresses.
Configuration management is concerned with how the network is
configured.
This involves setting configuration parameters in such a way that the
network can provide the services that it is supposed to.
Summary II
Accounting management deals with collecting and
recording data about how the network is used and about
the consumption of its services by end users.
It is at the heart of being able to collect revenues and to be able
to quantify the value that is derived from the network.
Performance management is all about collecting statistics
from the network to assess performance and tune the
network.
The goal is to allow for proper allocation of resources in the
network, such s removing bottlenecks, providing forecasts as
input for network planning, and delivering the best possible
quality of service with the given means.
Security management is concerned with managing
security-related aspects of the network.
It is geared toward averting various kinds of security threats that
a network and its management infrastructure are exposed to.
Summary III
The trend in networks is towards convergence using a single set of wires
and devices to handle voice, video, and data transmission.
In addition, there has been a dramatic shift in the way businesses
operate.
No physical offices or geographic boundaries constraints.
Resources must now be seamlessly available anytime and anywhere.
The Cisco Borderless Network architecture enables different elements,
from access switches to wireless access points, to work together and
allow users to access resources from any place at any time.
The traditional three-layer hierarchical design model divides the network
into core, distribution and access layers, and allows each portion of the
network to be optimized for specific functionality.
It provides modularity, resiliency, and flexibility, which provides a foundation
that allows network designers to overlay security, mobility, and unified
communication features.
Chapter 1: Summary
The traditional three-layer hierarchical design model
divides the network into core, distribution and access
layers, and allows each portion of the network to be
optimized for specific functionality.
It provides modularity, resiliency, and flexibility, which
provides a foundation that allows network designers to
overlay security, mobility, and unified communication
features.
Switches use either store-and-forward or cut-through
switching.
Every port on a switch forms a separate collision domain
allowing for extremely high-speed full-duplex
communication.

You might also like