Thursday, 6 December 2012

Task 1 - Network manager functions


Task 1 - Unit 5, P4 (Explain the functions of network management.) [George King]

Configuration.

  Network Administrators must configure and update aspects of a network to ensure that It constantly performs as necessary, and to constantly improve its systems to achieve its potential. From the initial stages of configuring a network there is both the hardware and software implementations needed - there are four essential stages.  First is the hardware, of which network devices make the bulk of the hardware needed for a network. Switches, routers, clients and cabling all will need to me configured so that they work as is intended, and will communicate. Next is the first of the software stages; once the user accounts are configured users will then be able to access resources such as shared files and printers.

  At this stage of the configuration process the network is at a point where it can work successfully, however, it will now be customised to meet the needs of a business. Application software is what a network will be used in order to produce work, and make other programs work. Here is where most of the network specific programs shall be installed, one of the programs that all networks will need in order to stay secure is anti-viral software. Correct configuration of security applications will allow a network to; scan itself for malicious content, deal with any malicious content found and produce reports of network security.

Fault Management.

  Administrators will use various tools and techniques in organisations to prevent massive problems happen to their network and its IT infrastructure. The duties of fault management falls into two categories - firstly how to prevent the fault and secondly, how to recover as quickly as possible from a fault. Systems that monitor a networks performance are used to alert administrators when there're issues that need to address. Other similar systems are used to either stop faults from happening, or mainly to alert those who can best fix a problem the quickest.

  Furthermore, the second aspect of fault management is to recover a network after its fault. This needs to be done as quickly as possible as this will reduce the damage level - along with costing an organisation for all of the time that its network is down. For example, administrators may have to work outside of regular hours to best fix its problems quickly. A key aspect of most fault management systems used in business is their ability to remotely control.  This will be controlled from a central position in relation to the network, here administrators can monitor and alter numerous fault management systems from one local position.
                                                                                                                                                                                                         
Account Management.

  The purpose of account management is to use tools to allocate permissions and manage all of the users accounts on a network. Administrators will have the job of also adding new users to the network, and then giving them their privileges - users are often grouped depending on what rights they have allocated to their accounts, this makes it easy to change multiple accounts. Another purpose of account management is to increase security of the network; this is done by restricting access to certain users who do not need to have access to that content. Users will only be given access to resources, information, programs and other areas of a network if they require it for work purposes only. 

Performance variables - Network Throughput, User response times, line utilisation.

  To be successful in managing a network, administrators must use tools and techniques to monitor key areas of the network. Performance variables are numerical terms used to measure the performance of areas within a network, often being used in reports to relay information back to the network administrators. By monitoring these areas with this technique, an organisation can change a network to ensure that it is being used efficiently and to the best of its ability.

  One of the first variables that can be monitored with in a network is the speed of how quick data can be sent to two network device (e.g. from a client to a server.)This technique is known as network throughput, a simple method to see the speed of data transmission is by sending a file between two devices, and seeing how long it takes. However, there are more accurate ways of doing this, by using tools such as IPERF. This GUI software is used to measure TCP/UDP bandwidth on Windows and Linux systems. With features that allow administrators to produce reports based on performance and can provide graphical representation.

  Another performance variable that can be monitored is the user response time of accounts and systems. As users primary role is to be able to provide services or resources to a user, this communication within the network must be monitored. Tools such as Nimsofts Monitoring Solution (NMS) provide information on the speed of users’ response times and allow for two types of monitoring - active and passive. Active monitoring uses software to remotely report back on their performance. Whereas passive monitoring will inspect packet times between intervals of requests and responses.

  With in networking, the majority of transmissions between two devices is done with the use of caballing - much like its connecting hardware, cables also need to be upgraded to best improve communication within the network. Line Utilisation shows a visual format how much data is being sent through the networking cables, thus showing if cables are overloaded or underused. Therefore, this technique is useful as it provides administrators evidence on how effective the cables are. Thus allowing decisions to make on how to alter or upgrade networking cables to best allow the network to work correctly.
  Activities - Planning, designing, installing

  When a network is first set up there are three tasks which network administrators will in order to complete tasks.

  First is the planning stages of the project, here is where decisions will be made on what is wanted from the network, and what will be needed in order to complete the project. More specifically, the number of hardware devices (e.g. switches and clients) will be need to decided, along with how they will communicate (e.g. wired or wireless.) Planning stages will also identify what additional equipment and peripherals will be needed, all of which will needed to account for in the budget of the network, and how they will be managed.

  Second is the design stage of a new network. This is where detailed diagrams and instructions will be made on how they want the network to look and assembled. Everything from; floor layouts, component lists, installation guides and cabling maps will all add clarity to the project. Efficient designs will make for a smoother and easy installation later on; this is because everyone will know what needs to be done, and how it will be done. Any aspect that has been over looked by a designer will have costly affects on the projects success - both effecting the time and budget.

  Once the above stages are complete, the network can now be installed. All of the hardware component will now be connected, wired together and given power via the power mains. If all of the initial plans and designs have been successful in accounting for all aspects of the installation, then it should be completed with limited hassle.

Network Operations - Data logging, checking performance and traffic, reporting.

  Only when a network is operational after the installation process can administrators begin to carry out networking options. Regardless of what a networks primary role is, all will be able to; log data, check performance and report back to its administrators.

  In order to collect information and make records of transmissions with in a network, administrators will use a technique called data logging. Data is usually logged at a particular point during the communication between two devices (e.g. between router and a server.) If a fault happened to network, logged data would be analysed to try and determine what the cause for that fault was - and even to try and prevent such incidents happening again.  However, most data logs are only temporary. Data logs can take up massive amounts of resources such as storage drives, and are only revised if f is need.

  For a business to keep its IT infrastructure working and to see if all its systems within a network are properly communicating - an organisation will use techniques to check performance and traffic. An example piece of software used to check performance is 'Microsoft's Network Monitor,' combined with 'paessler traffic grapher' to keep a track on incoming and outgoing traffic.

 Administrators will routinely check performance and the traffic of a network to;

-          Determine what the usual level of performance is for the network.

-          Based on previous reports, check when performance decreases and why.

-          Be able to spot trends in network performance and make decision to best optimise efficiency.

 
  With an organisations network being so crucial to its success, managers and administrators often like to have formal reports about the networks performance. Some of the  software applications previously mentioned, along with others are used in the industry not only to analyse the network, but to produce routine reports based on those findings. As with all of the systems, the report is used as a physical copy to provide evidence when the organisations wish to make decisions about the network. Even an Operating System such as 'Windows Server' can be used to obtain up-to-date information and then produce its own reports.

3 comments: