Sunday, 24 February 2013

Network Management Functions


Task 1 Unit 5 (P4)
Explain the functions of network management.


Network Management Functions Configuration

Network configuration is the process of maintaining and organising the information of the network components. If the network needs repairing, any modifications, expansions or upgrades the network manager can refer to the NCM database and to decide what the best course of action is. The database contains the locations and network addresses of all hardware devices; it also contains information about the programs, versions and updates installed in network computers.

Network configuration is a major aspect of setting a network up, the network will be regularly tweaked to improve performance and solve any issues that arise.

Fault Management

Fault management is the process and technology that the administrator uses to avoid faults within a networked system, this is so that the possibility of downtime is reduced, and this is done by detecting, isolating and fixing any malfunctions that occur. Network fault management can be monitored though programs that send an alarm to the administrator if the network starts to deteriorates in any monitored areas, this is useful as it can reduce the impact of a fault as the problem can be found and dealt with.

An example of a fault could be if a router was set to be monitored and an alarm went off to indicate that there was a problem the administrator could then run configurations on the device in the evening when everyone is at home so it doesn’t affect work and the system is kept running at its maximum.

Network account management
Account management is the process at where the administrator of the network can set what user has access to what type of file, however this can be a long process and most users have access to similar content, this is when account management software comes into use as the administrator can set groups of users that can access certain files and have privileges over others. The other benefit of using this is that it if a group of users need access to use a program it can be set on the console and will affect everyone straight away.

Performance variables

A network needs to be constantly monitored so that the administrator of the network can see if the network needs optimising. The network administrator can monitor the performance of the network, this is done through visual charts, and this can then be compared to the previous results to see if there are any improvements or if the administrator needs to go and reconfigure or change some of the network.

Security
The security of a network is very important as threats can come from many different directions and in many different forms some of these include internet (External) or even staff (internal). Keeping a network secure is hard work as there are lots of hackers and virus with the intent to do harm to you and your users, however with the right knowledge you can avoid such attempts on a network. Some programs can help reduce the chance of attacks these include an anti-virus program and a fire wall which block unwanted programs and people from accessing important information on the network.

 Data logging
Data logs are useful within a network as it records all the data and interactions that pass through a certain point in a system, usually between communications points such as a keyboard and display. This is useful as if there is a system failure, the administrator can go to the log and see what might have caused it.

Checking performance and traffic
When managing a network you need to be aware of the traffic that is passing through the system, this is easiest done by using software such as ‘network monitor’ this software allows the user to visually see in real time what the statistics of the networks usage is.

Reporting
This is possible the most useful tool as it allows the administrator to get a detailed report on the performance and usage of the network in an easy to read report, the report can be obtained through the networks operating system such as Windows server, this would include application response time, traffic analysis, packet analysis and device performance.

Network Fault Management


Task 2 Unit 5 (M2, 3)
Goals of fault management

Network Fault Management

Configuration
The configuration of a network will reduce the chance of faults as the devices would always be up to day and working correctly this means that there is less chance of down time, if the network did go down because of the configuration the server should have a copy of when all devices were working and it could be reset to then, however with the right knowledge faults can be prevented.

Account management
If the user accounts aren’t managed correctly it was cause lots of faults, such as users being unable to access data and could even cause users without privileges to access data they shouldn’t, this is why it is vital for user accounts to be under control  and have no faults.

Performance variables
 Checking the performance of the network will prevent faults, this is because it checks all the pieces of the network for deterioration and informs the network manager of any bits of the network that need attention, this prevents any failures.

Security
The security side of a network has to be up to date and constantly checked, this is because people are constantly trying to hack networks to cause faults within the system, anti-viruses and firewalls try to protect against these.

Data Logging
Data logging can help if any faults have happened as they will be logged and the network manager can then identify the problem and attempt to fix the problem.

Faults within a network need to be ironed out so that the network doesn’t suffer any downtime as it could lead to lost data and angry customers. These maintenance tasks are done to insure that any faults can be prevented or solved very quickly.
If the network did have faults, this could be cause by non-configured devices, virus, hacked, or corrupted data. These have to then be fixed and amended when it’s least likely to affect many people.

Routine performance maintenance


Unit 5 (D1)

Why carry out routine maintenance

Routine performance maintenance 

It’s important to maintain a network due to the amount of strain that it under, when the network isn’t getting attacked it has multiple people connecting to it and constantly adapting to peoples demands, this causes it to occasionally malfunction, we call this a fault in the network, however there a procedures in place to try to prevent such incidents.

Backing up data is important part of maintaining a network as if anything happens you always have an extra copy of all the data, this can solve lots of problems such as if data becomes corrupt, or a virus affects files. This is part of routine maintenance should be done every day to insure that files are secure and backed up and aren’t lost.

User accounts are created and deleted on a regular basis, it is important that such accounts are removed from the servers as they take up space and can be used to access the system if they aren’t deleted when they should have been. This could pose a security risk, as when a user leaves from the network if their account isn’t deleted then they can still access the network.

Scans for viruses should be carried out every day as new versions are created every day, the server will have to defend against these attacks, however as one is created, a defence is then also created. However the virus can sometimes creep in on any data, this is when an internal scanner should detected and remove the virus, however the firewall will usually prevent anything that isn’t legit from passing it.

File clean up, is a software that removes unused files such as internet history and cache as they can slow the computer up quite a bit, also files that are not needed are also removed and checked for integrity, this helps the server run more efficient and helps the quality of the service it can provide.

The log resources should be checked to insure that nothing in regular has happened, once this is done they can be deleted so that they do not slow the server down and reduce the quality of service.
If all of the procedures are done then the quality of service the users will receive will be increased as it prevents the server from having faults, overloaded with unused data, and increases the life of the server.





Networking tools



Task 4 Unit 5 (P2) & Unit 9 (P5)

Outline the purpose of networking tools.

Networking tools

Directory
The purposes of networking tools are so that the network manager can have complete control over the network, and this is done by using such tools as a directory, account management, authenticity management, active directory and DNS.

Account  
The purpose of this tool is to allow the administrators of the network to ensure that there is appropriate account management for groups and users.

User Groups/ accounts
User groups are set up to make it easier to set up lots of accounts, but it also provides a big advantage as if you need to allow a group of users to have access to something it makes it easy to do so. Groups can be set to only have rights to access certain areas such as files, directories, printers or servers. User groups allow users to move from one computer to another and keep their privileges.

Authenticity
When a request is made it usually needs to be authenticated first, this isn’t only on user accounts but through internet ecommerce and secure web pages where SSL is used to insure that what is being sent is encrypted and from a secure site, this is done by using a public and private key to insure that the page is as it says. With user accounts a password and username are used to authenticate the user.

DNS
Domain name server is a server that is used to change domain names into corresponding IP address. When the user searches for the domain name the computer will check the cache to see if the use user has access the page before and saved a location directory, if the directory isn’t there then it will go to the DNS sever and find the page.

Files
File transfer
A networked system allows users to share files; this is referred to as FTP. This allows users to share and receive files an example of software for this is Filezilla. FTP can also be used to allow users to download files without creating an account or password.

File Sharing
This type of file transfer is becoming more popular as it offers increased speed and security as you are paying for the service that you receive. The files that you download require a password and user account, you can also download multiple files at once.

Application services

Proxy server
A proxy is the middle man in trying to connect to the specified server, this is done so that the user can be directed to the correct place, and if the user has accessed the specified location before the proxy would remember and direct it quicker to the correct place. 

Storage space
Users can store there data in many different ways such as on a cloud, on a HDD or Portable media. Each of these have their benefits and flaws, for example if you store all of your data on a cloud, it is more prone to getting attacked by a virus or hacker, however if you have it on a HDD it could become corrupt and unusable.

VoIP
This is the protocol that allows users to send voice over the internet; this converts the voice into a digital medium and sends the data in packets to the recipient.

Telecommunication

IRC
This is a service that allows multiple people to connect together and chat, this is done through an IRC client server, and all the data is then sent in packets to this server and sent to everyone so that they all get the information. This is a useful service as it allows people from all around the world to connect together and talk.

Remote access
Remote access is when you can access a network from a different location, this can be on mobile devices such as a smart phone or even a laptop; however it can be quite a heavy program and could be quite demanding on hardware, this means that a desktop would be the best choice for remote accessing another system.