Network Chapter5 - Administration

download Network Chapter5 - Administration

of 32

Transcript of Network Chapter5 - Administration

  • 8/9/2019 Network Chapter5 - Administration

    1/32

    7/17/2010

    Lesson : 5

    Network Administration

  • 8/9/2019 Network Chapter5 - Administration

    2/32

    7/17/2010

    Objectives

    At the end of this session, you will be able to:

    List the tasks included in network management.

    Understand the requirement of user accounts in anetwork.

    Appreciate the importance of monitoring networkperformance.

    Identify some of the network management tools. Describe the methods of implementing network

    data security:

    Security models

    Auditing

  • 8/9/2019 Network Chapter5 - Administration

    3/32

    7/17/2010

    Objectives (contd.)

    Diskless computers

    Data encryption Virus protection

    Describe various methods to prevent data loss:

    Tape backup

    Uninterruptible power supply

    Fault tolerance systems

  • 8/9/2019 Network Chapter5 - Administration

    4/32

    7/17/2010

    Network Management

    Is required for an efficient functioning of thenetwork

    Includes administrative tasks such as:

    Creating and administering user accounts

    Implementing and supporting network resources

    Configuring the network

    Monitoring network performance

    Preventing and troubleshooting networkproblems

  • 8/9/2019 Network Chapter5 - Administration

    5/32

    7/17/2010

    User Accounts

    Are created on the central domain controller

    Are created for all users on the network

    Are granted privileges to access the networkresources

    Are composed of:

    User name

    Logon parameter

  • 8/9/2019 Network Chapter5 - Administration

    6/32

    7/17/2010

    Network Operating Systems

    Have two accounts that are already created forthe user:

    Guest account

    Administrator account

  • 8/9/2019 Network Chapter5 - Administration

    7/327/17/2010

    Administrator Account

    Is the first account created by the installationprogram

    Is the default account created for theadministrator

    Has all the administrative rights that enable theadministrator to:

    Start the network

    Set initial security parameters

    Create user accounts

  • 8/9/2019 Network Chapter5 - Administration

    8/327/17/2010

    Guest Account

    Is the default account created by the NOS

    For those who do not have an account on the

    domain controller Enables one-time users to access the computer

    with minimum permissions

  • 8/9/2019 Network Chapter5 - Administration

    9/327/17/2010

    Group Accounts

    Have privileges granted to a group of users onthe network

  • 8/9/2019 Network Chapter5 - Administration

    10/327/17/2010

    Needs to be monitored by the networkadministrator to:

    Ensure satisfactory network performance Predict possible network problems

    Prevent network problems

    Detect bottlenecks in the network

    Network Performance

  • 8/9/2019 Network Chapter5 - Administration

    11/327/17/2010

    Performance Monitor

    Is a utility offered by the Windows Server

    Can be used to view operations in real time andrecord time

    for the following: Processors

    Hard disks

    Memory

    Network utilization

    Can be used to record performance data

    Can be used to alert the administrator in case ofnon-conformance to requirements

  • 8/9/2019 Network Chapter5 - Administration

    12/327/17/2010

    Simple Network Management

    Protocol

    Is standard followed by network managementsoftwares

    Environment has programs called agents That are loaded on to the following network

    components that may require monitoring andinclude:

    hubs servers

    interface cards

    routers

    bridges

  • 8/9/2019 Network Chapter5 - Administration

    13/32

    7/17/2010

    Agents

    Monitor network behavior

    Store the information gathered in the

    Management Information Base (MIB )

  • 8/9/2019 Network Chapter5 - Administration

    14/32

    7/17/2010

    Network Security

    Is required to protect the network from:

    Unauthorized access

    Intentional or unintentional damage Data corruption

    Models are of two types:

    Password protected shares

    Access permissions

  • 8/9/2019 Network Chapter5 - Administration

    15/32

    7/17/2010

    Password Protected Shares

    Requires:

    A password to be assigned to each shared

    resource The user to type the password associated with

    each shared resource

    Access Permissions Security model involves

    Granting of permissions to use a particularresource

    P i i l h f

  • 8/9/2019 Network Chapter5 - Administration

    16/32

    7/17/2010

    Permissions control the type of

    access to a resource

    NO ACCESS

    READ

    READ

    EXECUTE

    WRITE

    DELETE

    NO ACCESS

    User 3

    User 2

    User 1

  • 8/9/2019 Network Chapter5 - Administration

    17/32

    7/17/2010

    Auditing

    Enables monitoring of network activities on useraccounts

    Enables the recording of selected events in thesecurity log of the Server

    Can record the following events in the Server:

    Log on/off

    Connecting and disconnecting from designatedresources

    Terminating connections

    Disabling accounts

    Opening or closing files

  • 8/9/2019 Network Chapter5 - Administration

    18/32

    7/17/2010

    Diskless Computers

    Are employed by organizations to implementnetwork data security

    Do not have a: Local floppy disk

    Hard disk

    Carry out disk operations by using the servers

    disk

  • 8/9/2019 Network Chapter5 - Administration

    19/32

    7/17/2010

    Data Encryption

    Makes the data in the network cable unreadable

    Permits the data to be decoded to normal

    readable format at the receiving end

    VirusProtection

    Is required to prevent data loss

  • 8/9/2019 Network Chapter5 - Administration

    20/32

    7/17/2010

    Data Protection

    Implies prevention of data loss

    Can be ensured by:

    Tape backup Uninterrupted Power Supply (UPS)

    Fault tolerance

  • 8/9/2019 Network Chapter5 - Administration

    21/32

    7/17/2010

    Backups

    Backups

    Ensure data recovery in case of data loss

    Are commonly taken on magnetic tapes because

    it is: Reliable

    Inexpensive

    Can be performed

    Daily

    Weekly

    Monthly

  • 8/9/2019 Network Chapter5 - Administration

    22/32

    7/17/2010

    Network traffic is reduced by

    backing up to a separate segment

    Isolated segment for backup

    Tapedrive

    Server

    Server

    Server

  • 8/9/2019 Network Chapter5 - Administration

    23/32

    7/17/2010

    UPS

    Is an automated external power supply

    Enables operation of an electrical device in the

    event of a power failure Works on batteries

  • 8/9/2019 Network Chapter5 - Administration

    24/32

    7/17/2010

    Fault Tolerance

    Duplicates data or places data on differentphysical sources

    Allows data redundancy

    To recover data in case of data loss

  • 8/9/2019 Network Chapter5 - Administration

    25/32

    7/17/2010

    Fault Tolerance (contd.)

    Options are categorized into levels known asRedundancy Array of Inexpensive Disks (RAID)which are:

    Level 0disk striping

    Level 1disk mirroring

    Level 2disk striping with Error Correction Code

    (ECC) Level 3ECC stored as parity

    Level 4disk striping with large blocks

    Level 5striping with parity

    Di k i i bi

  • 8/9/2019 Network Chapter5 - Administration

    26/32

    7/17/2010

    Disk striping combines areas on

    multiple drives

    192K

    64K

    64K

    64K

    Disk 1 Disk 2 Disk 3

  • 8/9/2019 Network Chapter5 - Administration

    27/32

    7/17/2010

    Level 0Disk Striping

    Divides data into 64 K blocks

    Spreads the data equally

    In a fixed order

    At a fixed rate

    among all disks in an array

    Level1Disk Mirroring

    Involves the duplication of a partition

    Transfers the duplicated partition to another disk

    Disk mirroring duplicates a

  • 8/9/2019 Network Chapter5 - Administration

    28/32

    7/17/2010

    Disk mirroring duplicates a

    partition on another physical diskDisk I/O

    Disk mirroring software

  • 8/9/2019 Network Chapter5 - Administration

    29/32

    7/17/2010

    Level 5

    Writes parity information to the disks along withthe data

    Distributes the: Parity information

    Data

    throughout the stripe set

    Striping with parity allows data

  • 8/9/2019 Network Chapter5 - Administration

    30/32

    7/17/2010

    Striping with parity allows data

    reconstruction if a drive fails

    Disk 1 Disk 2 Disk 3 Disk 4 Disk 5

    Parityinformation

  • 8/9/2019 Network Chapter5 - Administration

    31/32

    7/17/2010

    Sector Sparing

    Is also called as hot fixing

    Is a fault tolerance system

    In which sector-recovery capabilities areautomatically added to the file system

  • 8/9/2019 Network Chapter5 - Administration

    32/32

    7/17/2010

    Sector sparing or hot fixing steps

    Detects bad sector

    Moves data to good sector

    Maps out the bad sector