network management functionswiki.hct.ac.uk › _media › computing › btec › level3 ›...

Post on 28-May-2020

3 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

NETWORK MANAGEMENT FUNCTIONS

• Gain a knowledge of network maintenance activities.

• Discuss the impact of not maintaining our network.

• Highlight the importance of maintenance activities.

2

AIMS

REGULAR MAINTENANCE ACTIVITIES

• A network is a key part of any business IT system.

• To keep it running smoothly and securely it’s important you perform some basic

network management tasks.

• Network management and day-to-day administration often involve the same

types of activities.

• These activities occur as a direct result of network usage and changes in

organisational need (e.g. new departments, employees, hardware, projects

etc.). As such they are hard to avoid.

• A well-managed network will serve your business better, reducing the time you

spend solving problems and allowing you to get on with running your company.

WHY NETWORK MAINTENANCE MATTERS

There are several reasons why good network management is important.

• Prevent problems. Much like servicing a car, good network management will

stop problems occurring and prolong your network’s life.

• Work efficiently. Good management ensures your staff have access to the IT

they need to do their jobs effectively.

• Maintain security. Even if you set your network up securely to begin with, you

need good management to ensure it stays that way.

• Stay up to date. Although network technology doesn’t move as fast as other

areas of business IT, careful upgrades may help improve performance.

KEEPING ON TOP OF NETWORK MAINTENANCE

• To make sure network management and maintenance tasks are carried out regularly,

make someone in your business responsible for them and build the tasks into your

company’s schedule.

• If you leave them until someone has a spare moment, then they’ll probably never get

done!

• To minimise disruption, always perform network maintenance outside of normal working

hours.

• Tasks like optimising hard drives, running virus scans or testing backup systems can slow

down a network server.

• You may also be able to automate some management tasks. For instance, virus scanners

can be set to perform a full scan at a specific time and if you opt for cloud backup, the

service provider will do most of the heavy lifting for you.

EXAMPLES OF NETWORK MAINTENANCE

User account creation and deletion,

• The creation of user groups and individual user accounts is a vital aspect of network

management.

• The rights and privileges granted to a user as part of their account contributes to:

• the functionality they can access (i.e. which applications they can use, devices they can install)

• the data they can see (i.e. which files and folders they can access)

• the configuration and customisations they can make

• the shared resources (e.g. printers) they can use.

EXAMPLES OF NETWORK MAINTENANCE

• In addition, the use of user accounts and the individual responsibilities they bring

contribute many of the practical aspects of any network security policy.

• It is important that network accounts be managed regularly by updating rights and

privileges where required (for example as a result of an employee being transferred

to a management group through promotion) and deleting accounts of employees who

have left the company. WHY?

• The latter is vital, especially if the individual has left under poor relations with the

organisation (it is not unknown for an ex-employee to maliciously damage data or

systems if the opportunity presents itself).

EXAMPLES OF NETWORK MAINTENANCE

Login scripts

• A login script is a set of instructions (usually written in a scripting language, e.g. VBScript

or a command line batch file for Microsoft Windows NOS) that forces a networked

workstation to perform specific actions when the user logs into their account.

• A default login script is often created when a user account is created, based on the set

actions required by the user group to which that user belongs.

• This can then be modified and personalised by the network manager or administrator as

part of the user’s network profile.

EXAMPLES OF NETWORK MAINTENANCE

Login scripts

• Login scripts are a key component of a network’s security strategy and form the basis of the user’s

initial settings when they log into a workstation.

• Common elements of login scripts are:

• mapping network disk drives or folders to local logical device names. e.g. net use G:

\\MyFileServer\SMITHJ01.

• redirecting printer output to a shared network printer e.g. net use LPT1:

\\MyPrintServer\HPLaser.

• fixing a specified (organisational) screen saver or desktop wallpaper

• deleting temporary files

• automatically launching programs from the command line (e.g. monitoring programs).

• It should also be noted that some NOS also permit logoff, startup and shutdown scripts.

EXAMPLES OF NETWORK MAINTENANCE

File system maintenance

• Routine maintenance should be performed on all native file systems.

• This should include operations such as:

• anti-virus signatures

• back-up of settings, data files etc.

• file clean-up.

It is likely that these operations would be scheduled to run automatically at periods of

low network activity.

EXAMPLES OF NETWORK MAINTENANCE

BACK UPS

• The main purpose of this is to make sure that you are able to go back to a

working system should any major problem arise.

• When backing up the system you have 3 main options.

1. Imaged- based backup

2. File based backup

3. File Synchronization

IMAGE-BASED BACKUPS

• Image-based backup is a backup process for a computer or virtual machine that

creates a copy of the operating system and all the data associated with it,

including the system state and application configurations.

• The backup is saved as a single file that is called an image.

• If your main disk gets damaged this allows you to quickly recover, as every piece

of data will be stored in the backup, even the software applications and registry

data.

• They do take a long time to complete.

FILE-BASED BACKUPS

• File based backup is the type of backup that most people are familiar with.

• This form of backup has been around for a long time.

• The technologies employed are quite numerous, and backup solutions have been

developed for about every situation that can be imagined.

• While only a few dozen different disk imaging programs are currently on the market,

literally hundreds, perhaps thousands, of various file backup programs and systems exist.

• File based backups can be performed manually and are a simple case of moving specific

files from one machine to another machine/device/network areas or cloud storage system.

• This type of back up is faster however human error can come in to play.

TASK

Research 2 types of back up Image based and file base.

•Give an example where they might be best suited.

• Create a comparison table highlighting there possible strengths and

weakness.

• Conclude by selecting one of the backups and justifying your decision.

• Class will discuss their findings.

ADVANTAGES OF FILE BACKUPS

• Fine control over every aspect of your backup routine.

• Ability to work with small sets of files which is not usually possible with image backups.

• File fragmentation is greatly reduced if not nearly eliminated in backup archives.

• Easier to restore full backups or migrate data to new or different hardware.

• Generally more practical for remote backups over a network or Internet. • Real-time

backup or continuous data protection and versioning.

• Deduplication technologies work better on file based systems.

• Considered by many to be more resilient to error or corruption than imaging

technologies.

DISADVANTAGES OF FILE BACKUPS

• Human error can lead to lost files or files that have not been saved at all. • Some files

may not be able to be copied due to file format or software related issues.

• Some files may become corrupt during the transfer process and as a result all data will

be lost.

• Password protected items may become an issue or some files can become read only when

transferred between operating systems.

• The process although generally quicker than image backups can be a tedious exercise

depending on the amount of files to backup.

FILE SYNCHRONIZATION

• File Synchronization (“file sync”) is really a specialized adaptation of file based backup

technologies.

• Some would even say it is not true backup, but the result is basically the same.

• The primary design of sync programs are to replicate or mirror working files in two or more

locations where both sets of files will still be put into service.

• One way to understand the difference between synchronization and backup is that backup copies

files in one direction while synchronization copies files (or changes) in two directions.

• In backup you have a “source” and a “destination.”

• In true synchronization you really have two sources.

• For example, when a group of files are set to be synchronized between two computers, files which

are changed on any one of the computers will be reflected on the other.

ADVANTAGES OF FILE SYNCHRONIZATION

• Improves productivity when working with the same set of files in different

locations.

• Files synchronized to online sources can often be easily accessed from any

computer or mobile device such as a smart phone.

• Some programs combine real-time sync with a versioning system that allows for

easy collaboration between individuals working on the same file, and usually

provide diff comparisons and merging capabilities

EXAMPLES OF NETWORK MAINTENANCE

Virus Scans

• One of the top priority tasks for system administrators is keeping a network clean from

different threats.

• It can be achieved by using active antivirus protection on each PC and performing regular

network virus scanning.

EXAMPLES OF NETWORK MAINTENANCE

Other maintenance activities

There are a wide range of tools that network managers can use to manage performance or

fault find, so every network should have appropriate tools for these tasks.

• Managing performance.

• Fault finding.

• Finding network assets.

• Tracking device performance.

• System testing.

TASK

Research and provide 3 examples of how a network manager can do the following,

• Manage performance.

• Fault find.

• Find network assets.

• Tracking device performance.

• System testing.

Provide a working example use the college as a guide if you like.

• Gained knowledge about network management functions.

• Discuss what needs to be considered when designing a network.

• Evaluated Network design.

22

CONCLUSION

top related