maintaining the network

24
17 Maintaining the Network

Upload: ketan

Post on 15-Feb-2016

34 views

Category:

Documents


0 download

DESCRIPTION

Maintaining the Network. 17. Monitoring the Network. Network systems need to be constantly monitored to: Determine when failures occur To predict possible or imminent failure Activity can be monitored, recorded, and expressed statistically to predict failure - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Maintaining the Network

17Maintaining the Network

Page 2: Maintaining the Network

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc.

Monitoring the Network Network systems need to be constantly monitored

to: Determine when failures occur To predict possible or imminent failure

Activity can be monitored, recorded, and expressed statistically to predict failure

Predictions are based on system history

Page 3: Maintaining the Network

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc.

Baseline Should be established immediately after the

network or server is installed Should be routinely collected and reviewed to

predict events that could affect network or server performance

Page 4: Maintaining the Network

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc.

Network Baseline Information Peak utilization—Should not exceed 80% Average utilization—Should not exceed 40% Frame size peak and frame size average—Size

affected by protocol and equipment used, amount of segment traffic, and type of data transmitted

Number of protocols—Large number can indicate an improperly configured network device

Page 5: Maintaining the Network

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc.

Network Baseline Information (Cont.)

Number of nodes—Number of nodes communicating on the network segment

Most active 10 nodes—Indicator of possible network problem locations

Collisions—Primary indicator of a problem Packets dropped—Good indication there is a

cable or connection problem

Page 6: Maintaining the Network

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc.

Traffic Shaping Techniques Routers or layer 3 switches can be installed to

provide additional segment links Multiple segment paths can increase network

reliability provided by link redundancy

Page 7: Maintaining the Network

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc.

Network Bottlenecks Can be caused by servers and devices Insufficient resources

Solution: Add more RAM or configure more hard disk drives and map users to additional drives

Unbalanced client loads Solution: Change default server logon for users

Incorrectly configured service(s)

Page 8: Maintaining the Network

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc.

Server Baseline Memory utilization and swap file activity—

Determine if more RAM needs to be installed Hard disk activity—Determines if additional hard

drives need to be installed CPU utilization—Should not exceed 85%

Page 9: Maintaining the Network

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc.

Performance Monitor Provides administrator with information needed

for making objective decisions about the system Can be configured to send alerts to the

administrator when resources are critical Can be used to predict system failure or to isolate

cause of the poor performance

Page 10: Maintaining the Network

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc.

Performance Monitor Display

Page 11: Maintaining the Network

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc.

Windows Task Manager Provides a quick view of system performance Can show what software applications, processes,

and services are running

Page 12: Maintaining the Network

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc.

Resource Monitor

Page 13: Maintaining the Network

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc.

Microsoft Network Monitor Can be used to establish a baseline Displays all active network connections Collects frames in similar manner to protocol

analyzers Filters can be applied to specific protocol types or

contents Identifies fewer protocols than network analyzer

Page 14: Maintaining the Network

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc.

Microsoft Network Monitor Display

Page 15: Maintaining the Network

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc.

Event Viewer Records events that occur on computer, such as:

Starting and stopping of a service User logon activities Share access File access Hardware and software information

Excellent utility for troubleshooting system failures

Page 16: Maintaining the Network

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc.

Event Viewer Display

Page 17: Maintaining the Network

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc.

Maintaining System IntegrityTo protect data, fault tolerance and disaster recovery must be designed into the networkFault tolerance includes some RAID systems and electrical power systemsDisaster recovery includes data backups; hot and cold spares; and hot, warm, and cold sites

Page 18: Maintaining the Network

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc.

RAID 1RAID 1 consists of two disk drives with matching data on each drive

Page 19: Maintaining the Network

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc.

RAID 5RAID 5 combines parity and stripingAt least three hard disk drives are needed for a RAID 5 configuration

Page 20: Maintaining the Network

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc.

Backup Data MethodsFull backup—Only data needs to be copiedArchive bit is set on files when a full or incremental backup is performedArchive bit is not reset when a differential backup is performed or when copy and xcopy commands are used

Page 21: Maintaining the Network

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc.

Incremental BackupLess time than full backupFull backup is performed first, followed by daily incremental backupsTo restore, full backup is restored first, followed by daily incremental backupsIncremental backups must be restored in sequence

Page 22: Maintaining the Network

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc.

Differential BackupPerformed on days when full backup is not being performedPerform a full backup first, followed by daily differential backupsTo restore, full backup is restored first, then the last differential backup

Page 23: Maintaining the Network

Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc.

Storing Backup DataStore data backups

Off-site In a secure area with limited access In a climate-controlled storage area

Avoid storing backups In direct sunlight Near electrical panels or in equipment rooms Near magnetic fields generated by electrical

equipment

Page 24: Maintaining the Network

IN CLASS LAB

Roberts Labs 96,79,83,

NEXT CLASS

Labsim Homework 8.7.1-8.7.5