Task 1 - Unit 5,
P4 (Explain the functions of network management.) [George King]
Configuration.
Network Administrators must configure and update aspects of a network to
ensure that It constantly performs as necessary, and to constantly improve its
systems to achieve its potential. From the initial stages of configuring a
network there is both the hardware and software implementations needed - there are
four essential stages. First is the
hardware, of which network devices make
the bulk of the hardware needed for a network. Switches, routers, clients and
cabling all will need to me configured so that they work as is intended, and
will communicate. Next is the first of the software stages; once the user accounts are configured users will
then be able to access resources such as shared files and printers.
At this stage of the configuration process the network is at a point
where it can work successfully, however, it will now be customised to meet the
needs of a business. Application
software is what a network will be used in order to produce work, and make
other programs work. Here is where most of the network specific programs shall
be installed, one of the programs that all networks will need in order to stay
secure is anti-viral software.
Correct configuration of security applications will allow a network to; scan
itself for malicious content, deal with any malicious content found and produce
reports of network security.
Fault Management.
Administrators
will use various tools and techniques in organisations to prevent massive
problems happen to their network and its IT infrastructure. The duties of fault
management falls into two categories - firstly how to prevent the fault and secondly, how to recover as quickly as possible from a fault. Systems that monitor a
networks performance are used to alert
administrators when there're issues that need to address. Other similar systems
are used to either stop faults from happening, or mainly to alert those who can
best fix a problem the quickest.
Furthermore, the second aspect of fault
management is to recover a network
after its fault. This needs to be done as quickly as possible as this will
reduce the damage level - along with costing an organisation for all of the
time that its network is down. For example, administrators may have to work
outside of regular hours to best fix its problems quickly. A key aspect of most
fault management systems used in business is their ability to remotely control. This will be controlled from a central
position in relation to the network, here administrators can monitor and alter
numerous fault management systems from one local position.
Account Management.
The purpose of account management is to use tools to allocate permissions and manage all of
the users accounts on a network. Administrators will have the job of also
adding new users to the network, and then giving them their privileges - users are often grouped
depending on what rights they have allocated to their accounts, this makes it
easy to change multiple accounts. Another purpose of account management is to
increase security of the network; this is done by restricting access to certain users who do not need to have access
to that content. Users will only be given access to resources, information,
programs and other areas of a network if they require it for work purposes
only.
Performance variables
- Network Throughput, User response times, line utilisation.
To be successful in
managing a network, administrators must use tools and techniques to monitor key
areas of the network. Performance
variables are numerical terms used to measure the performance of areas
within a network, often being used in reports to relay information back to the
network administrators. By monitoring these areas with this technique, an
organisation can change a network to ensure that it is being used efficiently
and to the best of its ability.
One of the first variables that can be monitored with in a network is
the speed of how quick data can be sent to two network device (e.g. from a
client to a server.)This technique is known as network throughput, a simple method to see the speed of data
transmission is by sending a file between two devices, and seeing how long it
takes. However, there are more accurate ways of doing this, by using tools such
as IPERF. This GUI software is used
to measure TCP/UDP bandwidth on Windows and Linux systems. With features that
allow administrators to produce reports based on performance and can provide
graphical representation.
Another performance variable that can be monitored is the user response time of accounts and
systems. As users primary role is to be able to provide services or resources
to a user, this communication within the network must be monitored. Tools such
as Nimsofts Monitoring Solution (NMS) provide
information on the speed of users’ response times and allow for two types of
monitoring - active and passive. Active
monitoring uses software to remotely report back on their performance. Whereas
passive monitoring will inspect
packet times between intervals of requests and responses.
With in networking, the majority of
transmissions between two devices is done with the use of caballing - much like
its connecting hardware, cables also need to be upgraded to best improve
communication within the network. Line
Utilisation shows a visual format how much data is being sent through the
networking cables, thus showing if cables are overloaded or underused.
Therefore, this technique is useful as it provides administrators evidence on
how effective the cables are. Thus allowing decisions to make on how to alter
or upgrade networking cables to best allow the network to work correctly.
Activities - Planning, designing, installing
When a network is first set
up there are three tasks which network administrators will in order to complete
tasks.
First is the planning stages
of the project, here is where decisions will be made on what is wanted from the
network, and what will be needed in order to complete the project. More
specifically, the number of hardware devices (e.g. switches and clients) will
be need to decided, along with how they will communicate (e.g. wired or
wireless.) Planning stages will also identify what additional equipment and
peripherals will be needed, all of which will needed to account for in the
budget of the network, and how they will be managed.
Second is the design stage of
a new network. This is where detailed diagrams and instructions will be made on
how they want the network to look and assembled. Everything from; floor
layouts, component lists, installation guides and cabling maps will all add
clarity to the project. Efficient designs will make for a smoother and easy
installation later on; this is because everyone will know what needs to be
done, and how it will be done. Any aspect that has been over looked by a
designer will have costly affects on the projects success - both effecting the time
and budget.
Once the above stages are complete, the network can now be installed. All of the hardware
component will now be connected, wired together and given power via the power
mains. If all of the initial plans and designs have been successful in
accounting for all aspects of the installation, then it should be completed
with limited hassle.
Network Operations -
Data logging, checking performance and traffic, reporting.
Only when a network is
operational after the installation process can administrators begin to carry
out networking options. Regardless of what a networks primary role is, all will
be able to; log data, check performance and report back to its administrators.
In order to collect information and make records of transmissions with
in a network, administrators will use a technique called data logging. Data is usually logged at a particular point during
the communication between two devices (e.g. between router and a server.) If a
fault happened to network, logged data would be analysed to try and determine what the cause for that fault was - and
even to try and prevent such incidents happening again. However, most data logs are only temporary. Data logs can take up
massive amounts of resources such as storage drives, and are only revised if f
is need.
For a business to keep its IT infrastructure working and to see if all
its systems within a network are properly communicating - an organisation will
use techniques to check performance and
traffic. An example piece of software used to check performance is 'Microsoft's Network Monitor,' combined
with 'paessler traffic grapher' to keep
a track on incoming and outgoing traffic.
Administrators will routinely check performance and the traffic of a
network to;
-
Determine what the usual level of performance is
for the network.
-
Based on previous reports, check when
performance decreases and why.
-
Be able to spot trends in network performance and
make decision to best optimise efficiency.
With an organisations network being so
crucial to its success, managers and administrators often like to have formal reports about the networks performance.
Some of the software applications previously
mentioned, along with others are used in the industry not only to analyse the
network, but to produce routine reports based on those findings. As with all of
the systems, the report is used as a physical copy to provide evidence when the
organisations wish to make decisions about the network. Even an Operating
System such as 'Windows Server' can
be used to obtain up-to-date information and then produce its own reports.