TO network ADMINISTRATION Concepts and Practice of Modern network management Course Information COURSE INSTRUCTOR: J K alwala, department of Computer science, School of Computing and Informatics. Lectures: Mondays 7 am to 9 am (SCS 329); 11 am to 1 pm (CCS 315) first lectures May 5, 2014. - LAB Sessions: Schedule to be announced.
TO network ADMINISTRATION Concepts and Practice of Modern network management Course Information COURSE INSTRUCTOR: J K alwala, department of Computer science, School of Computing and Informatics. Lectures: Mondays 7 am to 9 am (SCS 329); 11 am to 1 pm (CCS 315) first lectures May 5, 2014. - LAB Sessions: Schedule to be announced.
TO network ADMINISTRATION Concepts and Practice of Modern network management Course Information COURSE INSTRUCTOR: J K alwala, department of Computer science, School of Computing and Informatics. Lectures: Mondays 7 am to 9 am (SCS 329); 11 am to 1 pm (CCS 315) first lectures May 5, 2014. - LAB Sessions: Schedule to be announced.
Network Management Course Information COURSE INSTRUCTOR: J K Alwala, Department of Computer Science, School of Computing and Informatics, cell phone 0726906954/0734882170, email: alwala@maseno.ac.ke/jokalwala@gmail.com LECTURES/LABS Lectures: Mondays 7 am to 9 am (SCS 329); 11 am to 1 pm (CCS 315) first lectures May 5, 2014. LAB Sessions: Schedule to be announced. EXAMS AND ASSESSMENTS CAT#1, 2 pm to 3.30 pm, June 2, 2014.(CCS 315); June 3, 2 pm to 3.30 pm(SCS 329) Maximum score 10 %. CAT#2, 2 pm to 3.30 pm, July 1, 2014. (CCS 315); July 2, 2 pm to 3.30 pm(SCS 329) Maximum score 10 %. Lab exercises reports, continuous, maximum score 10% Semester exams, 2 hours, maximum score 70%. Date TBA. REFERENCES TCP/IP Protocol Suite, 4 th edition, Forouzan Computer Networks, 4 th edition, A Tanenbaum Windows server 2008: TCP/IP Fundementals for Windows (.pdf) Linux Network Administrator's Guide, 2nd Edition,Olaf and Dawson LABS AND ASSIGNMENT MATERIALS (ATTACHMENTS) Case Study: read and answer questions at end of the chapter. Submit by July 25, 2014. Lab exercises: Labs 1 to 4. Submission dates to be announced. (see Labs _2041mayfolder attached) Study the Wireshark tutorial i8n the attachment
Course Topics PART ONE: NETWORK ADMIN. AND MANAGEMENT BASICS Introduction to Network Administration and Management WK1 Network management components and Performance metric WK2 Introduction to Simple Network Management Protocol (SNMP) WK3 PART TWO: TCP/IP NETWORK ADMINISTRATION The TCP/IP Protocol suite : Overview of protocol structure and components WK 4 Management of Ethernet LANS WK5 Management of WLANs WK6 Management of WANs and Internet Connectivity WK7 Admin. TCP/IP Based Services: HTTP, Telnet, DNS, and DHCP WK8 Administering Network Security and Recovery WK9 Troubleshooting of Networks. WK 10
Introduction Networks are made up of a very wide range of devices, technologies and software components Computer networks are heterogeneous in hardware and software. Network components can be broadly classified as: Hardware Software All the components must be carefully selected and installed/implemented in the right infrastructural environment. The environment has a critical influence on the overall performance of the network. To ensure all issues are considered and built into the network, an appropriate life cycle should be adopted. At inception, networks require planning. After planning comes deploymentnew equipment needs to be installed and properly turned up. Only then do regular operations ensue. As the network matures, upgrades must be planned and performed. Finally, equipment must be decommissioned and network traffic cut over to new equipment or to a new generation of networking technology. The Case For Network Management Case for NM The Case for NM ROI Example (Using Mgt Tools) Network Manager Responsibilities Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems. Thus a network manager has a number of broad responsibilities Ensure that the users of a network receive the information technology services with the quality of service that they expect Strategic and tactical planning of the engineering, operations, and maintenance of a network and network services Help network engineers deal with the complexity of a data network and to make sure that data can go across it with maximum efficiency and transparency to the users Network Management Definition Network Management Definition Network Management Functions 12 NM Functions Broader Definition of NM Distinction is made among the management of: The networks themselves, The end systems that are connected to networks, and (networked) applications running on the systems connected to the networks. This distinction separates the terms network management, systems management, and application management Significance of NM A key factor for the economic success of businesses, whether services providers or businesses that run own networks Consumers may chooses between Service Providers on a number of issues: Who can operate the network at the lowest cost and pass those cost savings on to customers? Who provides better customer experience by making it easy to order communication services and service those orders with minimal turnaround time? Who can maintain and guarantee the highest quality of service? Who can roll out services fast and efficiently? For enterprises running own networks: Cost savings in operating the network benefit the enterprise that the network serves; fast turnaround time to deploy new services, and maintain a high quality of service These can translate into important competitive advantages
Benefits of NM: COST Several benefits accrue from NM, grouped as reduced cost, improved QoS and increased revenue. Cost: one of the main goals of NM is to Reduce and minimize Total Cost of Ownership (TCO). NM can help improve efficiency: Use of Network testing and troubleshooting tools, enabling operators to more quickly identify and isolate problems and thereby free themselves up for other tasks. Systems that facilitate turn-up of services and automate provisioning. fewer operational steps must be performed by an operator. reduces the potential for human error. Reducing required maintenance skill level. Performance-reporting tools and bottleneck analysis. Enables service providers to allocate network resources to where they are needed most, minimizing the required investment in the network and maximizing the bang for the buck. NM Benefits: Quality 1 Quality of the communications and networking services that are provided. This includes properties such as the bandwidth that is effectively available, or the delay in the network, which, in turn, is a factor in the responsiveness a user experiences when using services over a network. Quality also includes the reliability and the availability of a communications service, typically associated only with the network itself Developing network equipment with redundant hardware so that if a component fails, a hot failover to a spare can occur Networks carefully engineered to allow for redundant communication paths, in many cases ensuring network availability that is overall higher than the availability of any single element in the network Intelligent capabilities are introduced to automatically reroute communication traffic around faults or fiber cuts
NM Benefits: Quality II Quality can be assured through Systems for the end-to-end provisioning of a service automate many of the steps that need to be performed to configure the devices in the network properly Performance trend analysis can help network managers detect potential network bottlenecks and take preventive maintenance action before problems occur and before services and users are negatively impacted Alarm correlation capabilities enable faster identification of the root cause of observed failures when they occur, minimizing the time of actual outages Quality impact hard to quantify. Can use opportunity cost: Lost revenue from customers taking their business elsewhere if quality objectives are not met. Increased networking cost from inefficient utilization or networking resources, leads to more networking equipment and capacity being deployed to support a certain level of service than would otherwise be necessary Higher operational cost that is spent on fixing problems and having to monitor additional equipment that would not be necessary if quality would meet required levels and existing equipment were better utilized NM Benefits: REVENUE NM can also be a revenue enabler that opens up market opportunities that would not exist without it. Examples: Service provisioning systems enable service providers to reduce the time that elapses from the time a service is ordered to the time the service is actually turned up. Quickly translates into quicker time to revenue generation. In some cases, NM enables a service provider to augment a service offering with management-related capabilities that attract more customers. E.g.,the capability of a customer to track accounting charges online and to configure service features over the Web (examples for voice: caller ID, follow-me services) and have them take effect immediately constitutes a valuable service feature. Cost savings made possible through NM might make certain services feasible in the first place Users of NM Many different players are concerned with different aspects of NM, depending on their particular perspective. The Service Provider (SP): Any communication and networking service, such as telecommunication services (telephone, voice mail) and data services (leased lines, Internet connectivity)..TSPs and ISPs Application Services Providers (ASPs) Enterprise IT departments are in charge of running the network inside an enterprise, providing the enterprise with all its internal communication needs. Consideration include: A cost center, so the focus is on how to provide the communication services the enterprise needs at the lowest cost possible. IT departments have one customer: the enterprise. End users within the enterprise have no choice in who provides their service. IT departments might be forced to outsource much of their operations to a service provider (then called a managed service provider), to minimize distraction for the enterprise from their core business. End users, often refers to users who keep the network running or network managers Rely on NM systems and applications. Include network admin for router configuration and tuning: engineers, technicians, helpdesk support staff, network planners NM Providers Includes Equipment Vendor, 3 rd Party Application Vendor and the Systems Integrator. Equipments vendor: Primarily in the business of selling networking equipment, not NM applications. Hence, traditionally have shown a tendency to limit investment in NM application development But modern-day equipment vendors are paying increasing attention to NM. This includes management applications made available for the equipment, e.g., basic management software might come bundled with the equipment Third Party Applications Vendor: provide NM features for a wide range of products and to details above those provided by equipment vendors. Vendor independent or multivendor support The Systems Integrator: provides services to integrate a set of management applications with a specific network and operations support environment, often plugging functional gaps and providing interface adaptations that might be necessary to turn a set of independent applications into a turnkey solution that is customized for a specific network provider. Performs a customer-tailored development Communicating with the Network Methods of Communicating with the Network Basic Communication Models: 2-tier 2-tier Communication Model 2-tier Comm Model Example 3-Tier Comm. Model NM FRAMEWORKS Section Two FCAPS Framework Two frameworks exist that can be used to model Network management: FCAPS , ITIL, and TMN Either framework can help one evaluate management tools and define network management tasks in a given situation. FCAPS (fault-management, configuration, accounting, performance, and security) is an acronym for a categorical model of the working objectives of network management. Addresses the network management applications that reside upon the NMS There are five levels: in FCAPS FFault management: At the F level, network problems are found and corrected. Potential future problems are identified, and steps are taken to prevent them from occurring or recurring. In this way, the network is kept operational, and downtime is minimized. CConfiguration: At the C level, network operation is monitored and controlled. Hardware and programming changes, including the addition of new equipment and programs, modification of existing systems, and removal of obsolete systems and programs, are coordinated. An inventory of equipment and programs is kept and updated regularly. AAccounting: The A level, which might also be called the allocation level, is devoted to distributing resources optimally and fairly among network subscribers. This makes the most effective use of the systems available, minimizing the cost of operation. This level is also responsible for ensuring that users are billed appropriately. PPerformance: The P level is involved with managing the overall performance of the network. Throughput is maximized, bottlenecks are avoided, and potential problems are identified. A major part of the effort is to identify which improvements will yield the greatest overall performance enhancement. SSecurity: At the S level, the network is protected against hackers, unauthorized users, and physical or electronic sabotage. Confidentiality of user information is maintained where necessary or warranted. The security systems also allow network administrators to control what each individual authorized user can (and cannot) do with the system. ITIL Framework ITIL (The Information Technology Infrastructure Library) was designed to provide a better framework to deliver high-quality, consistent application delivery over a network infrastructure. FCAPS framework is a model for defining the objectives of network management, ITIL framework is a best practice model aligned with IT organizational structure. It builds on the FCAPS model. A set of practices for IT Service Management (ITSM) that focusses on aligning IT services with the needs of an organization ITIL framework adapts to the organizations environments to provide quality assurances toward providing better network management practices. These practices include a framework for application, service, and security management. Application management: Designed to ensure that an application has the right configuration and design to be implemented in the environment. can cover many various aspects of network management, from number of application dependencies to delay timers for satellite links. Application management is designed to ensure that the application, end-to-end, is fully enabled to provide the service and delivery to the end users. Software asset management: Software asset management is designed to be partially configuration management as it provides essential information about the software installed on each device, its revision or platform level, and how many instances are required. Accounting for proper licensing and software maintenance is a big business with many larger IT organizations. ITIL Components ITIL (2011) comprises five volomes: ITIL Service Strategy: understands organizational objectives and customer needs ITIL service Design: turns service strategy into a plan for delivering the business objective ITIL Service Transition: develops and improves capabilities for introducing new services into supported environments ITIL Service Operation: manages services in supported environments ITIL Continual Service Improvement: achieves service incremental and large-scale improvements
ITIL Framework Service support: (typically a network operations center (NOC) in most organizations.) The service support discipline is focused on ensuring that the end users have access to the applications that they require. Focuses on aspects of troubleshooting, help desk, and supporting new applications over the network. Underlying disciplines for service support include problem management, configuration management, and change management. Problem management would track the number of incidents and facilitate troubleshooting of faults or performance problems that occur in the environment. To troubleshoot a network environment, a good understanding of what devices are on the network and their configuration is handled by the configuration management (often referred to as configuration management database (CMDB)). Change management also involves both aspects of problem management and configuration management Efficient service support would include the ability to create a process for troubleshooting and escalation to higher level engineers, PC and client PC installations, and access to other aspects of the organization that are responsible for implementation and design of the network among other duties. ITIL Framework Service delivery. Consists of ensuring that as applications are flowing across the network, they are being delivered consistently. This discipline includes capacity management and application modeling. Service level objectives and agreements are the key metrics used to distinguish how well an application is being delivered to end users. Security management: Key traditional characteristics in ensuring that external threats are mitigated with firewalls and access prevention. Also includes proper configuration management of rights and permissions of users to ensure that unauthorized access is not granted to end users. An area of focus to ensure that unauthorized or unintended access of sensitive application data is not obtained. Infrastructure management Infrastructure management is responsible for the installation and physical configuration of all network devices in the organization. When changes are approved by the change teams, infrastructure teams are the army that enforces these changes and does all of the heavy lifting based on the designs by other architects and engineers. TMN Model ITU-T protocol Model for managing open systems in a communications network. Framework for achieving interconnectivity and communications across heterogeneous operationss system and comm networks. Defines set of interface points for elements which perform actual communications processing to be accessed by elements to monitor and control them For communication between operations systems and Network Elements (NEs) it uses the Commomn Management Information Protocol (CMIP) The fundemental layered software used in ISDN, ATM, SDH/SONET, and GSM. TMN Architectural tructure: Functional architecture Physical architecure Security architecture Logical layered architecture Four Logical Layers: Business Management Service Management Network management Element managementki TMN Model TMN (Telecommunications Management Network) refers to a set of standards by the International Telecommunications Union (ITU-T) The TMN hierarchy, a reference model that specifies a set of management layers that build on top of each other and address different abstractions of the management space Five layers: business management (top), service management, network management, element management, and network element (bottom). Element Management layer Involves managing the individual devices in the network and keeping them running. Includes functions to: view and change a network elements configuration, monitor alarm messages emitted from elements in the network, and Instruct network elements to run self-tests. Network Element- The management agent, in effect. involved with the management functionality that the network element itself supports, independent of any management system. is at the bottom of the management hierarchy; everything else builds on top of it. TMN Model Layers Network Management Layer Involves managing relationships and dependencies between network elements, to maintain end-to-end connectivity of the network. It offers the concept of a forest, as opposed to individual trees It is concerned with keeping the network running as a whole. In contrast with network element mgt, which does not deal with ensuring overall network integrity. Monitoring tasks at the network management layer involves ensuring that data flows across the network and reaches its destination with acceptable throughput and delay The network management layer makes use of functionality provided by the element management layer, providing additional functions on top. TMN Model Layers Service management is concerned with managing the services that the network provides and ensuring that those services are running smoothly and functioning as intended. For example, when a customer orders a service, the service needs to be turned up, with all the accompanying task providers Help-desk, troubleshooting, etc. Services range from the basicsuch as providing simple data connectivity or telephony serviceto the more sophisticatedsuch as hosting large-scale enterprise websites that require balancing of load across servers and transparent setup of virtual LANs. Service management tasks build on functionality that is provided by the network management layer underneath and provide additional value on top, applying them to the context of managing a service. Business Management Layer Deals with managing the business associated with providing services and all the required support functions. This includes topics as diverse as billing and invoicing, helpdesk management, business forecasting, and many more. The Hierarchical Model Overview NM FUNCTIONAL DESCRIPTION Section Five FAULT MANAGEMENT (F) Fault management deals with faults that occur in the network, such as equipment or software failures, as well as communication services that fail to work properly. Fault management is therefore concerned with monitoring the network to ensure that everything is running smoothly and reacting when this is not the case. Effective fault management is critical to ensure that users do not experience disruption of service and that when they do, disruption is kept to a minimum. Fault management functionality includes but is not limited to the following: Network monitoring, including basic alarm management as well as more advanced alarm processing functions Fault diagnosis, root cause analysis, and troubleshooting Maintaining historical alarm logs Trouble ticketing Proactive fault management F: Fault Management Steps for successful fault management: Identify the problem by gathering information about the state of the network (polling and trap generation) Restore any services that have been lost Isolate the cause and decide if the fault should be managed Correct the fault if possible F- Monitoring Overview Network monitoring includes functions that allow a network provider organization to see whether the network is operating as expected, to keep track of its current state, and to visualize that state. This functionality is fundamental to being able to recognize and react to fault conditions in the network as they occur. The most important aspect of network monitoring concerns the management of alarms. Alarms are unsolicited messages from the network that indicate that some unexpected event has occurred, which in some cases requires operator intervention. Alarm management includes many functions that we classify into basic functions: such as alarm collection, and visualization More advanced functions that involve processing alarms to perform filtering and correlation tasks. Alarm Visualization Visualization can occur simply through textual lists. Each alarm results in an entry in the list, containing information about the alarm. Those lists can be searched, sorted, and filtered according to many different criteria, such as alarm severity, the type of alarm, the network element (or range of network elements) affected, the type of network element affected, the time of day when the alarm occurred, and many more. Topology Maps Icons and lines on the map represent devices and links and can be animated to indicate the current alarm state. Icons and the lines can be animated with different colors to indicate the severity of the alarm: red might be used for devices on the map with a critical alarm, orange for major alarms, yellow for minor alarms, and green for no alarms. Gray might be used to indicate lost management connectivity to the device. Alarm Visualization Maintaining Alarm Historical Data Historical alarm data is not required for monitoring the network but is useful in many other ways. Examples Historical alarm data can be mined to help with future diagnosis and .Basically, this can be helpful to identify alarm patterns that have occurred in similar form on past occasions. It can be used to establish trends, to see how alarm rates and types of alarms reported have evolved over time. It can be analyzed in conjunction with other historical data, such as changes that have been performed on the networkfor example, the introduction of new network elementsand its impact on historical alarm patterns, or correlation of alarms with certain usage patterns of the network. Configuration Management CM is at the core of network management in general. Includes functionality to perform operations that will deliver and modify configuration settings to equipment in the network. This includes the initial configuration of a device to bring it upthat is, to be properly connected to the networkas well as ongoing configuration changes. There is also need to keep track of what configurations have been done in the network CM involves several distinct activities: Configuring managed resources, whether they are network equipment or services running over the network Auditing the network and discovering whats in it Synchronizing management information in the network with management information in management applications Backing up network configuration and restoring it in case of failures Managing software images running on network equipment Configuration Management Steps for successful configuration management: Gather current network configuration (either manually or automatically) Use that data to modify network device configuration in order to provision the network Store the configuration data and maintain an up-to date inventory of all network components Produce various inventory reports Accounts Management All about the functions that allow organizations to collect revenue and get credit for the communication services they provide, and to keep track of their use. It is hence at the core of the economics of providing communications services Accounting need be done for service consumption: In general, usage data is based on volume, duration, and/or quality. Examples of accounting measures are megabytes of data traffic, minutes of phone calls, number of service transactions, and use of premium or guaranteed services versus best-effort services Accounts Management Address the different steps involved for accounting management: Gather network resource utilization information Use metrics to set usage quotas Billing users for their network use Consider the cost of accounting Performance Management Steps for successful performance management Collect data on current network link and device utilization Baseline the utilization metrics and isolate any existing performance problems Set utilization thresholds based on the baseline Analyze the historical data for recognizing trends Resource planning and tuning Remember Measuring performance impacts performance Performance Management Performance of networks is characterized by a multitude of performance characteristics, measured according to metrics. Some examples of performance metrics are these: Throughput, measured by a number of units of communication performed per unit of time. The units of communication depend on the layer, type of network, and networking service in question. Examples are as follows: At the link layer, the number of bytes, or octets, that are transmitted per second At the network layer, the number of packets that are routed per second At the application layer for a web service, the number of web requests that are serviced per second At the application layer for a voice service, the number of voice calls, or call attempts, that can be processed per hour Utilization: a relative number that expresses throughput as a percentage of the theoretical maximum capacity of the underlying system. Delay, measured in a unit of time, metrics being layer or networking service dependent: At the link layer, the time that it takes for an octet that is transmitted to reach its destination at the other end of the line At the network layer, the time that it takes for an IP packet to reach its destination At the application layer for a web service, the time that it takes for a request to reach its destination at the host servicing the request after the request has been issued At the application layer for a voice service, the time it takes to receive a dial tone after you have lifted the receiver
Performance Management Quality is in many ways also performance related and can be measured differently, depending on the networking service At the link layer, the number or percentage of seconds during which errors in transmission occurred At the network layer, the number or percentage of packets dropped At the application layer for a web service, the number or percentage of web requests that could not be serviced At the application layer for a voice service, the number or percentage of voice calls that were dropped or abnormally terminated Performance Management Monitoring and Tuning: Includes a wide variety of functions. At the most basic level, you want to be able to retrieve a snapshot of the current performance: packet counters, delay measures, and gauges that indicate utilization percentages. Help detect trends and bottlenecks Collecting performance data Periodic snapshots need to be taken and stored in a file system or database. Based on protocols and automated tools, over specified periods. Security Management (S) Steps for successful security management: Identify sensitive information or devices Find the access points Secure the access points Protect the sensitive information by configuring encryption policies Implement a network intrusion detection scheme to enhance perimeter security Security Maanagement Related to securing a network from threats, such as hacker attacks, the spread of worms and viruses, and malicious intrusion attempts. Two aspects need to be distinguished: security of management, which ensures that the management itself is secure, and management of security, which manages the security of the network. For example, access to the management interfaces of the devices in the network needs to be secured to prevent unauthorized changes to network configurations. The management network needs to be secured to prevent disruption to management traffic. Requiress securing applications as well Maintaining tamper-proof security audit trails that record any management operations that are performed on the network. Protection against iternal threats is generally more difficult. Security Management: essential tasks Foolowing tasks ensure an effective security management Set up proper processes and procedures to ensure orderly operations Assign access privileges only to those who actually need these privileges for their immediate job function Require secure passwords that cannot easily be cracked Require that passwords be changed at regular intervals Establish audit trails, themselves secured properly Set up proper facilities for backup and restore of critical management data Management of security itself is critical, against common security threats Hacker attacks of individuals who try to obtain improper control of a system that is connected to the network. Denial-of-service (DOS) attacks that try to overload portions of a network by generating illegitimate traffic, preventing legitimate network traffic from getting through. A variant is distributed denial-of-service (DDOS) attacks, which coordinate those attacks from multiple sources, making them harder to defend against. Viruses and worms that attempt to corrupt and possibly destroy systems along with their file systems, which are connected to the network or which are network devices themselves. Related to this are Trojan horses, malicious code that masquerades as a useful and innocent program that, when opened by a user, can wreak havoc. Spam, also considered a security problem because its volume can overwhelm a network and its servers. Management of Security Management of security involves other functions: Intrusion detection involves monitoring traffic on the network to detect suspicious traffic patterns that could indicate an ongoing attack. One technique that can help guard against the spread of viruses involves inspecting traffic payload to see what is carried inside it, and then discarding or marking content that is apparently intended to compromise the networks security. Methods that involve inspection can sometimes be ineffective, however, because in Applying policies that limit or allow to only gradually increase the amount of traffic that is geared toward a particular destination or that originates from a particular source. The capability to blacklist ports and network addresses at which suspicious traffic patterns are observed and through which suspected offenders may enter the network. Those ports and addresses can be put under additional scrutiny and monitored for suspicious activity so that they can be quickly shut down if an attack is suspected. incorporating honey pot, a piece of equipment or a host system that appears to be a part of the regular network but is actually isolated and specially secured. It serves as a trap. Because the honey pot is not an actual part of the production network, any traffic that is directed at the honey pot can with reasonable certainty be regarded as malicious. Network Operating Centre (NOC) Where it all happens Coordination of tasks Status of network and services Fielding of network-related incidents and complaints Where the tools reside (NOC server) Documentation including: Network diagrams database/flat file of each port on each switch Network description Much more . The Big Picture Growing Complexity of Networks Our digital world is changing Information must be accessed from anywhere in the world Networks must be secure, reliable, and highly available
Elements Of A Converged Network Collaboration is a requirement To support collaboration, networks employ converged solutions Data services such as voice systems, IP phones, voice gateways, video support, and video conferencing Call control, voice messaging, mobility and automated attendant are also common features Elements Of A Converged Network Benefits of Converged Networks include: Multiple types of traffic; Only one network to manage Substantial savings over installation and management of separate voice, video and data networks Integrates IT management
Borderless Switched Networks Cisco Borderless Network is a network architecture that allow organizations to connect anyone, anywhere, anytime, and on any device securely, reliably, and seamlessly It is designed to address IT and business challenges, such as supporting the converged network and changing work patterns Hierarchy in the Borderless Switched Network Borderless switched network design guidelines are built upon the following principles: Hierarchical Modularity Resiliency Flexibility
Evolving IT Challenges Some of the top trends include: Bring Your Own Device (BYOD) Online collaboration Video communication Cloud computing
Emerging Enterprise Architectures Cisco Borderless Networks Collaboration Architecture Ciscos collaboration architecture is composed of three layers: Application and Devices Unified communications and conference applications, such as Cisco WebEx Meetings, WebEx Social, Cisco Jabber, and TelePresence. Collaboration Services Supports collaboration applications. Network and Computer Infrastructure Allows collaboration anytime, from anywhere, on any device.
Data Center and Virtualization The data center architecture consists of three components: Cisco Unified Management Solutions Simplifies and automates the process of deploying IT infrastructure and services with speed and enterprise reliability. Unified Fabric Solutions Delivers network services to servers, storage, and applications, providing transparent convergence, and scalability. Unified Computing Solutions Ciscos next-generation data center system unites computing, network, storage access, and virtualization into a cohesive system designed to reduce total cost of ownership (TCO).
Summary I NM is about running and monitoring networks. NM plays a significant role in saving cost, making operation of a network more efficient, and ensuring effective use of resources in the network. Different players have an interest in network management for different reasons, and therefore approach it from slightly different angles Many of the NM challenges are of a technical nature and relate to the fact that management applications tend to be complex systems with stringent requirements in terms of scale, robustness, extensibility, and maintainability. Fault management consists of functions to monitor the network to ensure that everything is working properly. Dealing with alarms and the large volume of events that are constantly being generated is one of the challenges that fault management addresses. Configuration management is concerned with how the network is configured. This involves setting configuration parameters in such a way that the network can provide the services that it is supposed to. Summary II Accounting management deals with collecting and recording data about how the network is used and about the consumption of its services by end users. It is at the heart of being able to collect revenues and to be able to quantify the value that is derived from the network. Performance management is all about collecting statistics from the network to assess performance and tune the network. The goal is to allow for proper allocation of resources in the network, such s removing bottlenecks, providing forecasts as input for network planning, and delivering the best possible quality of service with the given means. Security management is concerned with managing security-related aspects of the network. It is geared toward averting various kinds of security threats that a network and its management infrastructure are exposed to. Summary III The trend in networks is towards convergence using a single set of wires and devices to handle voice, video, and data transmission. In addition, there has been a dramatic shift in the way businesses operate. No physical offices or geographic boundaries constraints. Resources must now be seamlessly available anytime and anywhere. The Cisco Borderless Network architecture enables different elements, from access switches to wireless access points, to work together and allow users to access resources from any place at any time. The traditional three-layer hierarchical design model divides the network into core, distribution and access layers, and allows each portion of the network to be optimized for specific functionality. It provides modularity, resiliency, and flexibility, which provides a foundation that allows network designers to overlay security, mobility, and unified communication features. Chapter 1: Summary The traditional three-layer hierarchical design model divides the network into core, distribution and access layers, and allows each portion of the network to be optimized for specific functionality. It provides modularity, resiliency, and flexibility, which provides a foundation that allows network designers to overlay security, mobility, and unified communication features. Switches use either store-and-forward or cut-through switching. Every port on a switch forms a separate collision domain allowing for extremely high-speed full-duplex communication.