planning and installing network

87
Confidential Network+ Planning and Installing Networks

Upload: ravi-narayan-bhat

Post on 18-Nov-2014

144 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Planning and Installing Network

Confidential

Network+

Planning and Installing Networks

Page 2: Planning and Installing Network

2Confidential

Objectives

Describe the elements and benefits of project management

Manage a network implementation project

Understand network management and the importance of baselining

to assess a network’s health

Plan and follow regular hardware and software maintenance

routines

Describe the steps involved in upgrading network hardware and

software

Page 3: Planning and Installing Network

3Confidential

Project Management

Managing staff, budget, timelines, and other resources and

variables to achieve specific goal within given bounds

Attempts to answer at least following questions:

Is proposed project feasible?

What needs must project address?

What are project’s goals?

What tasks are required to meet goals?

How long should tasks take, and in what order should they be

undertaken?

Page 4: Planning and Installing Network

4Confidential

Project Management (continued)

Attempts to answer at least the following questions (continued):

What resources are required, and how much will they cost?

Who will be involved and what skills are needed?

How will staff communicate?

After completion, did project meet stated need?

Most projects divided into phases

Milestone: reference point marking completion of major task or

group of tasks in project

Page 5: Planning and Installing Network

5Confidential

Project Management (continued)

Figure : Project phases

Page 6: Planning and Installing Network

6Confidential

Determining Project Feasibility

Feasibility study outlines costs and benefits of project

Attempts to predict whether it will yield favorable outcome

Should be performed for any large-scale project before resources

committed

Page 7: Planning and Installing Network

7Confidential

Assessing Needs

Needs assessment: process of clarifying reasons and objectives

underlying proposed change(s)

Interviewing users

Comparing perceptions to factual data

Analyzing network baseline data

Page 8: Planning and Installing Network

8Confidential

Assessing Needs (continued)

Needs assessment may address the following:

Is expressed need valid or does it mask a different need?

Can need be resolved?

Is need important enough to allocate resources to its resolution? Will

meeting it have measurable effect on productivity?

If fulfilled, will need result in additional needs? Will fulfilling it satisfy

other needs?

Do users affected by the need agree that change is a good answer?

What kind of resolution will satisfy them?

Page 9: Planning and Installing Network

9Confidential

Setting Project Goals

Project goals help keep project on track

Necessary when evaluating whether project was successful

Popular technique is to begin with broad goal, narrow down to

specific sub-goals

Project goals should be attainable

Feasibility study helps determine attainability

Sponsors: managers and others who oversee resource allocation

Stakeholder: any person affected by the project

Page 10: Planning and Installing Network

10Confidential

Project Planning

Project plan: organizes details of a project

e.g., timeline and significant tasks

May use text or spreadsheet documents for small projects

For large projects, use project management software

Provides framework for inputting tasks, timelines, resource assignments,

completion dates, and so on

Page 11: Planning and Installing Network

11Confidential

Project Planning (continued)

Figure : A project plan in Microsoft Project

Page 12: Planning and Installing Network

12Confidential

Tasks and Timelines

Project should be divided into specific tasks

Divide large tasks into sub-tasks

Assign duration, start date, finish date to each task and sub-task

Designate milestones, task priority, and how timeline might change

Allow extra time for significant tasks

Gantt chart: popular method for depicting when projects begin and

end along a horizontal timeline

Page 13: Planning and Installing Network

13Confidential

Tasks and Timelines (continued)

Figure : A simple Gantt chart

Page 14: Planning and Installing Network

14Confidential

Communication

Project manager responsible for facilitating regular, effective

communication among project participants

Must communicate with stakeholders as well

Must prepare users for changes:

How access to network will be affected

How data will be protected during change(s)

Whether you will provide means for users to access the network during

change(s)

Whether users will have to learn new skills

Page 15: Planning and Installing Network

15Confidential

Contingency Planning

Even meticulously planned projects may be derailed by unforeseen

circumstances

Contingency planning: process of identifying steps that minimize risk

of unforeseen events that could affect quality or timeliness of

project’s goals

Page 16: Planning and Installing Network

16Confidential

Using a Pilot Network

Pilot network: small-scale network that stands in for a larger network Used to test changes before applying to enterprise Should be similar enough to closely mimic larger network’s hardware,

software, connectivity, unique configurations, and load Tips for creating realistic and useful pilot network:

Include at least one of each type of device that might be affected by the change

Use same transmission methods and speeds as employed on your network

Page 17: Planning and Installing Network

17Confidential

Using a Pilot Network (continued)

Tips for creating realistic and useful pilot network (continued):

Try to emulate number of segments, protocols, and addressing

schemes in current network

Try to generate similar amount of traffic

Implement same server and client software and configurations as found

in current network

Test for at least 2 weeks

Page 18: Planning and Installing Network

18Confidential

Testing and Evaluation

Test after completing each major step

Must establish testing plan

Including relevant methods and criteria

Testing should reveal:

Whether task was successful

Unintended consequences

Whether new needs exposed

Page 19: Planning and Installing Network

19Confidential

Network Management

In broad terms, assessment, monitoring, and maintenance of all aspects of a network

Network management applications may be used on large networks Continually check devices and connections to ensure they respond

within expected performance threshold May not be economically feasible on small network

Several disciplines fall under heading of network management All share goal of preventing costly downtime or loss

Page 20: Planning and Installing Network

20Confidential

Obtaining Baseline Measurements

Baseline: report of network’s current state of operation

Baseline measurements allow comparison of future performance

increases or decreases caused by network changes with past network

performance

The more data gathered while establishing the baseline, the more

accurate predictions will be

Several software applications can perform baselining

Page 21: Planning and Installing Network

21Confidential

Obtaining Baseline Measurements (continued)

Figure : Baseline of daily network traffic

Page 22: Planning and Installing Network

22Confidential

Obtaining Baseline Measurements (continued)

Baseline assessment should address:

Physical topology

Access method

Protocols

Devices

OSs

Applications

Page 23: Planning and Installing Network

23Confidential

Performance and Fault Management

Performance management: monitoring how well links and devices

are keeping up with demands

Fault management: detection and signaling of device, link, or

component faults

Organizations often use enterprise-wide network management

software

At least one network management console collects data from multiple

networked devices at regular intervals

Polling

Page 24: Planning and Installing Network

24Confidential

Performance and Fault Management (continued)

Each managed device runs a network management agent

Collects information about device’s operation and provides it to network

management application

Definition of managed devices and data collected in a Management

Information Base (MIB)

Simple Network Management Protocol (SNMP): TCP/IP protocol

used by agents to communicate

Page 25: Planning and Installing Network

25Confidential

Performance and Fault Management (continued)

Figure : Network management architecture

Page 26: Planning and Installing Network

26Confidential

Performance and Fault Management (continued)

Network management application can present an administrator with

several ways to view and analyze data

Network management applications are challenging to configure and

fine-tune

Multi Router Traffic Grapher (MRTG): command-line utility that uses

SNMP to poll devices, collects data in a log file, and generates

HTML-based views of data

Page 27: Planning and Installing Network

27Confidential

Performance and Fault Management (continued)

Figure : Map showing network status

Page 28: Planning and Installing Network

28Confidential

Performance and Fault Management (continued)

Figure : Graphs generated by MRTG

Page 29: Planning and Installing Network

29Confidential

Asset Management

Identifying and tracking hardware and software on a network First step is taking detailed inventory of each node on network

Asset management tool choice depends on organization’s needs Should ensure that asset management database regularly updated Simplifies maintaining and upgrading the network Provides info about costs and benefits of hardware or software

Page 30: Planning and Installing Network

30Confidential

Software Changes

General steps:

Determine whether change is necessary

Research purpose of change and potential effects on other applications

Determine whether change should apply to some or all users

Notify system administrators, help desk personnel, and users

Schedule change for off-hours, if possible

Back up the current system or software

Page 31: Planning and Installing Network

31Confidential

Software Changes (continued)

General steps (continued):

Prevent users from accessing system or part of system being altered

Keep upgrade instructions handy and follow them

Make the change

Test the system fully

If successful, re-enable access to system

If not, roll back changes

Communicate changes made

Record changes in change management system

Page 32: Planning and Installing Network

32Confidential

Patches

Patch: correction, improvement, or enhancement to particular piece

of a software application

Changes only part of an application

Often distributed at no charge by software vendors

Fix bugs

Improve functionality

Back up system before installing

Install during off-hours

Test after installing

Regularly check with vendor for patches

Page 33: Planning and Installing Network

33Confidential

Client Upgrades

Software upgrade: major change to a software package’s existing

code

Designed to add functionality and fix bugs in previous version of the

client

Typically overwrites some system files

Installation may affect other applications adversely

Test on single workstation before distributing to all users

Workstation-by-workstation or network installation

Page 34: Planning and Installing Network

34Confidential

Shared Application Upgrades

Apply to software shared by clients on network

Same principles as modification of client software

Usually designed to enhance application’s functionality

Weigh time, cost, and effort against necessity

For significant upgrade, may need to provide user training

Page 35: Planning and Installing Network

35Confidential

Network Operating System Upgrades

Usually involves significant changes to way servers and clients

operate

Requires forethought, product research, and rigorous testing before

implementation

May require specific project plan

Consider the following in project plan:

Effect on user IDs, groups, rights, and policies

Effect on file, printer, and directory access

Effect on applications or client interactions

Effect on configuration files, protocols, and services

Page 36: Planning and Installing Network

36Confidential

Network Operating System Upgrades (continued)

Consider the following in project plan (continued):

Effect on server’s interaction with other devices

Accuracy of testing in simulated environment

How it will be used to increase efficiency

Technical support arrangement with OS’s manufacturer

Allotted enough time to perform upgrade

Can reverse the installation if troubles arise

Communicate benefits to others

Page 37: Planning and Installing Network

37Confidential

Network Operating System Upgrades (continued)

Basic steps for performing upgrade:

Research

Project plan

Proposal

Evaluation

Training

Pre-implementation

Implementation

Post-implementation

Page 38: Planning and Installing Network

38Confidential

Reversing a Software Change

Backleveling: process of reverting to previous version of software after attempting to upgrade

Table : Reversing a software upgrade

Page 39: Planning and Installing Network

39Confidential

Hardware and Physical Plant Changes

Often performed to increase capacity, improve performance, or add

functionality to network

Proper planning is key to successful upgrade

Steps for changing network hardware:

Determine whether change necessary

Research upgrade’s potential effects on other devices, functions, and

users

Communicate change to others and schedule it

Back up current hardware’s configuration

Prevent users from accessing system

Page 40: Planning and Installing Network

40Confidential

Hardware and Physical Plant Changes (continued)

Steps for changing network hardware (continued):

Keep installation instructions and hardware documentation handy

Implement change

Test hardware

Preferably with higher than normal load

If successful, re-enable access to device

If not, isolate device or reinsert old device

Communicate results of changes to others

Record change in change management system

Page 41: Planning and Installing Network

41Confidential

Adding or Upgrading Equipment

Difficulty depends largely on experience with specific hardware

Networked workstation: simplest device to add

Directly affects only a few users

Does not alter network access for others

Networked printer: slightly harder than adding networked

workstation

Shared, unique configuration process

Time required to install does not usually affect productivity

Page 42: Planning and Installing Network

42Confidential

Adding or Upgrading Equipment (continued)

Hub or access point:

Only worry about downtime if upgrading or swapping out existing hub or

access point

Must consider traffic and addressing implications

Server requires great deal of foresight and planning

Consider hardware and connectivity implications, as well as issues

relating to NOS

Add while network traffic low or nonexistent

Restrict access to new servers

Page 43: Planning and Installing Network

43Confidential

Adding or Upgrading Equipment (continued)

Switches and routers: often physically disruptive

Affects many users

Router or switch may have unintended effects on segments other than

the one it services

Plan at least weeks in advance

Keep safety in mind

Follow manufacturer’s temperature, ventilation, antistatic, and moisture

guidelines

Page 44: Planning and Installing Network

44Confidential

Cabling Upgrades

May require significant planning and time to implement

Best way to ensure future upgrades go smoothly is careful

documentation of existing cable

Upgrade cabling in phases

Weigh importance of upgrade against potential for disruption

Larger organizations rely on contractors who specialize in cabling

upgrades

Page 45: Planning and Installing Network

45Confidential

Backbone Upgrades

Most comprehensive and complex network upgrade Upgrading entire backbone changes whole network

Examples: Migrating from Token Ring to Ethernet Migrating from slower technology to faster one Replacing routers with switches

May require upgrading cabling and hardware First step is to justify upgrade Second step is determining backbone design to implement

Page 46: Planning and Installing Network

46Confidential

Reversing Hardware Changes

Provide a way to reverse hardware upgrades and reinstall old

hardware if necessary

Keep old components safe and nearby

Old hardware may contain important configuration information

Page 47: Planning and Installing Network

47Confidential

Structured Cabling

Comprises of cables and associated hardware parts Provides an organized way of low voltage wiring Transmits data that is built in structured form Need of structured cabling:

Consistency – Standard cabling systems for Data, voice and video Cost Reduction – Reduces the cost by reducing the number of cables Troubleshooting – Isolates and fixes the problem Mobility – Network resources are portable Supports upgrading – Supports future applications

Page 48: Planning and Installing Network

48Confidential

Design Considerations of Structured Cabling

Page 49: Planning and Installing Network

49Confidential

Structured Cabling - II

Design Considerations of structured cabling Entrance Facilities – Connects the building with the outside world Equipment Room – Serves the users within the room Telecommunications Room – Accommodates the cabling system equipment Backbone Cabling – Interconnects telecommunications room, equipments

room and entrance facilities

Page 50: Planning and Installing Network

50Confidential

Structured Cabling - III

Design Considerations of structured cabling

Horizontal Cabling – Extends from the work area telecommunications outlet

to telecommunications closet

Work Area – Components extend from the telecommunications outlet to the

stations equipment

Page 51: Planning and Installing Network

51Confidential

Cable Distance – I

Horizontal Cabling Distance

horizontal cabling distance is 99 meters (TIA/EIA-568A)

6 meters of patch cable

90 meters horizontal (routed in the wall)

3 meters of station cable

99 meters total (rounded off to 100 meters)

Backbone cable Distance

Depends on type of cable being used and on its location

Page 52: Planning and Installing Network

52Confidential

Pulling Cables - I

While dealing with structured cabling you have to pull out the cables from

some conduits and punch down the free end of the cable

Conduits are PVC or flexible plastic pipes used to organize the cables

Pull twine through the conduits

Page 53: Planning and Installing Network

53Confidential

Pulling cables - II

Elements required for

pulling cables

Fish Tape Twine ConduitsScale and

TapePatch Panel

Page 54: Planning and Installing Network

54Confidential

Pulling Cable Tools

Fish Tape Twine Conduit

Scale & Tape

Patch Panel

Page 55: Planning and Installing Network

55Confidential

Cables

Two or more wires bound together, in protective jacket or sheath

Different types of cables:

Twisted pair cable

Coaxial cable

Optical fiber cable

Shielded and Unshielded cable

Page 56: Planning and Installing Network

56Confidential

Cable Connectors – I

Part of cable which plugs into port or interface to connect one device to

another

Connectors: Male and Female

DB-15 connectors - Commonly used on electronic and computer equipment

RJ45 Connectors – Used in networking to connect computer to network card

BNC Coaxial Connectors – Used with coaxial cables or used with Ethernet

system

Page 57: Planning and Installing Network

57Confidential

Cable Connectors – II

210 Patch Plug – Uses internal pair isolation, pair-to-pair compensation and

layered contacts

Token-Ring Data Connector – Used on end of a shielded twisted pair cable

Distinguishing Wires

Color coding makes identification each wire or pair of wires in the cable

easier

Tip and ring – Identifies plus wire and minus wire

Page 58: Planning and Installing Network

58Confidential

Cabling Tools

Used in networking to work with wires or devices or to connect wires and

devices to each other

Different tools used are:

Punchdown Tools

RJ45 Crimping Tool

Coaxial Cable Crimping Tool

Pin Crimping Tool

Cable stripper

Page 59: Planning and Installing Network

59Confidential

Working with Cables – I

Installation works in three stages:

Running cable from central point to the room

Wall jacks are mounted and cables ended into jacks

Wire cables from the central end to switchboard

Color Coding

Helps to classify different types of wires

Patch cable and cross over cable can be differentiated on the basis of

colour coding

Page 60: Planning and Installing Network

60Confidential

Working with Cables – II

Tools and materials required for crimping cable:

RJ45 Crimping Tool

Wire stripper

Wire cutter

RJ-45 plugs

Cat-5 UTP cables

Page 61: Planning and Installing Network

61Confidential

Working with Cables – III

Straight through Cable

Same pin out connections at both ends

Used to connect dissimilar devices

Crossover Cable

Modify pin out connections at one end

Used to connect similar types of devices

Page 62: Planning and Installing Network

62Confidential

Working with Cables – IV

Weak Link Mostly, weakest link is the station cable, which runs from wall to desktop

Information Outlet Protect horizontal wiring from physical handling that cables receive Keep installation neat and eliminate unsightly snake pit of unused cables

coiled on floor Station Cable

Runs between information outlet and network node e.g. PC

Page 63: Planning and Installing Network

63Confidential

RJ45 Modular Outlet

Device used to connect shielded or unshielded cables

Acts as extension where wires are fixed on the either side of modular

connector

Page 64: Planning and Installing Network

64Confidential

Closet

Main point in an organization where major networking cabling come together

Equipment in a wiring closet includes:

Patch panels for vertical wiring

Patch panels for horizontal wiring

Wiring hubs

Uninterruptible Power Supplies

Types of wiring closets:

Intermediate Distribution Frames (IDF)

Main Distribution Frame (MDF)

Page 65: Planning and Installing Network

65Confidential

Closet Details

Typical equipment in a wiring closet are:

Backbone wiring cross-connect device

Horizontal wiring cross-connect device

Patch cables

Wiring hubs

Backup power for wiring hubs

Router and modems

Access server

Page 66: Planning and Installing Network

66Confidential

Cross-Connect Devices - I

Make easy to reconfigure horizontal and backbone wiring

Terminates cable or group of cables

Make terminations available for interconnection to other cables

In data networks – Small cross-connect device will terminate backbone

cable and make it available for connection to wiring hub

In wiring hub – Larger cross-connect device will terminate horizontal wiring

before it enters hub

Page 67: Planning and Installing Network

67Confidential

Cross-Connect Devices - II

66M Punch Down Block

Patch Panel

Page 68: Planning and Installing Network

68Confidential

Cabinets and Racks - I

Patch panels and wiring hubs can mount on wall in brackets, stand in

racks or reside in full cabinets that are racks with doors

If small installation – Mount patch panels and wiring hubs on wall

Page 69: Planning and Installing Network

69Confidential

Cabinets and Racks - II

Distribution Rack

Full Equipment

Cabinet

Rack

Page 70: Planning and Installing Network

70Confidential

Neat Cables

Used to avoid damage to cable pairs and used to tie the cables

Ties come in many sizes and materials

Page 71: Planning and Installing Network

71Confidential

Uninterruptible Power Supplies (UPS)

Equip network file servers with backup

power

Allow wiring hubs to go without power

during power failure

Page 72: Planning and Installing Network

72Confidential

Conduits

Plastic pipes that run through wall plate between wiring closets

If space left:

Used to pull a new cable

Used as replacement for a bad one

For added capacity

Fish tape

An equipment which is part of any installers toolbox

Consists of a reel of wire stiff enough to push its way through the conduit

Page 73: Planning and Installing Network

73Confidential

Cable Trays

Provide large cable system

Wire rack designed to carry the weight of the cables

Common in modern wiring closets and in building infrastructure spaces such

as basements, airshafts, and ceiling

Point to note when cables run inside ceilings and walls

Page 74: Planning and Installing Network

74Confidential

Configuring Backbone Cable

Wiring closet that contain patch and cross-connect panels which connect to

horizontal wiring

Backbone wiring link each wiring closet to cross-connect point or (MDF)

Locating the closet

Different parameters to keep in mind when going for closet

Backbone Cable

Modern installations use UTP or fiber-optic cable for the backbone

Page 75: Planning and Installing Network

75Confidential

Installation of Racks

Explains how to place networking equipments and accumulate different

small equipment on the plate of the rack

Factors to be considered while installing the rack:

Location to install the rack

Installation holes marking

Installation of the rack nuts

Mount the different rails onto the rack

Mount the different devices onto the rack

Page 76: Planning and Installing Network

76Confidential

Managing Cables

Cables:

Should not run over desk

Should not be entangled

To manage cables:

Free space on the desk where the cables will run

Holes at top of desk

Mount to protect cables

Page 77: Planning and Installing Network

77Confidential

Wire Manager

Used to mange wires that are common to one place

Tools used to manage wires:

Cable ties

Conduits

Twines

Cable manager

Labels

Spiral wraps

Unitags

Page 78: Planning and Installing Network

78Confidential

Labeling Cables

Used to identify path of the cables

Distinct color and pattern of code of cable label helps identify cables

Labels can be written with a pen or a pencil

Cables labeled using Label templates

Labels on Outlet

Page 79: Planning and Installing Network

79Confidential

Case Study 1

The network administrator of the Mumbai branch of MoneyMaker bank is facing difficulties in maintaining the network. In case the network goes down due to some hardware failure, identifying the source of the problem and troubleshooting it is very time consuming. The layout of the network has not been changed since the time it was set up.

Page 80: Planning and Installing Network

80Confidential

Problem

The maintenance and troubleshooting of the network is problematic and time consuming

Page 81: Planning and Installing Network

81Confidential

Solution

Deploy a dedicated closet

Use full equipment cabinet

Use rack and configure the hardware

Use appropriate cable and crimp the cable

Define maximum backbone cable length and horizontal cable length

Use different wire manager

Use modular outlet and I/O plate

Use third party hardware monitoring or the troubleshooting devices

Page 82: Planning and Installing Network

82Confidential

Summary

Project management is the practice of managing staff, budget,

timelines, and other resources and variables so as to complete a

specific goal within given bounds

A feasibility study determines whether a proposed project fits within

an organization’s budget, time, and staff restrictions

A needs assessment is the process of clarifying the reasons and

objectives for a proposed change

Project goals help keep a project on track

Page 83: Planning and Installing Network

83Confidential

Summary (continued)

A project plan describes how the details of a managed project are

organized

The best way to evaluate a large-scale network or systems

implementation is to first test it on a small scale on a pilot network

Network management involves assessing, monitoring, and

maintaining network devices and connections

Page 84: Planning and Installing Network

84Confidential

Summary (continued)

Baselining includes keeping a history of network performance, physical topology, logical topology, number of devices, OSs and protocols, and number and type of applications

An asset management system includes an inventory of the total number of components on the network as well as each device’s configuration files, model number, serial number, location on the network, and technical support contact

A patch is an enhancement or improvement to a part of a software application

Page 85: Planning and Installing Network

85Confidential

Summary (continued)

A software upgrade represents a major change to the existing code

The process of upgrading an NOS should include research,

proposal, evaluation, training, pre-implementation, implementation,

and post-implementation phases

Hardware and physical plant changes may be required when your

network has problems

The most comprehensive and complex upgrade involving network

hardware is a backbone upgrade

Page 86: Planning and Installing Network

86Confidential

Summary - I

Structured cabling system is a set of cabling which interconnects different equipments in an organization in a structured manner

Cable connectors are used to connect the cables Cabling tolls are helpful to make connection between the cable and the

connector Colour Code helps to identify the types of wires Cat5 cables are punched into Information outlet (IO) as per the colour

coding Jack Panel is used to connect horizontal cabling to network

Page 87: Planning and Installing Network

87Confidential

Summary - II

Straight through cables have the pin out connections similar at both the ends

Cross over cable change the pin out connections at one end Installing the rack explains how to place networking equipments and

accumulate different small equipment on the tray of the rack Wire manager can organize the disorganized cables and makes it easy to

access Labeling the cables help you to identify the path of the cables and makes

the troubleshooting easy