Lesson 14 Flashcards
Topic A
Topic A
To efficiently manage your network you must be able to do what
Monitor it
Network management involves which functions
Operations
Administration
Maintenance
Provisioning
What is network operations
Procedures that allow for the smooth running of the network and monitoring to spot problems as they arise
What is network administration
Keeping track of the assignment and utilization of devices on the network
What in network maintenance
Repairing and upgrading network components to ensure optimally functionality
What is network provisioning
assign resources to support a service
What is the goal of network mgmt
To make operations more efficient
Network quality includes
Reliability and Availability
What are some of the specific requirements relating to services
Bandwidth
Connections
Others
SNMP
Simple Network Management Protocol
Layer 7 Protocol
Collects information about network devices
Used for Diagnostics and Maintenance
SNMP has how many components
Management system (SNMP Manager)
Agent software
SNMP agents are installed on what
Servers
Routers
printers to name a few
What does the SNMP manager do
Notifies admins
Take corrective action
Store information for review
Queries agents about specific devices
MIBs
Management Information Base
Describes the structure of the management dataof a sub sytem
OIBs
Object Identifier
Identifies a variable that can be read or set via SNMP
Name the SNMP operations
Get - REquest to retrieve the value of a variable or list of variable
Trap - enables an agent to notify the management station of significant events by way of unsolicited SNMP message
Walk - essentially a GET operation performed on the MIB node that has child nodes or column nodes. It performs the OID walk through the child nodes or column nodes
Which is the safest version of SNMP
V3
Describe the SNMP versions
V1 - developed 1988
V2 - developed 1993 and added serveral protocol operations and initiatil security measures
V3 developed 2002 Added security and remote configuaration capabilities. Addfed authentication privacy and access control
Which SNMP version added Authentication, privacy and access control
V3
Which port does SNMP use
UDP 161 and 162
What captures and analyzes traffic, creates logs ad alerts admins
Network monitoring tools
What are some things network monitoring tools can look for
Congestion
Constructing baselines
Determine upgrade needs
Generate reports
Name some network monitoring tools
LAN monitor QoS monitor Bandwith monitor WAN monitor SIEM monitor
Throughput tester
Measures throughouot and capacity.
Which tool sends large packets from a source to destination to determine the time it takes to transmit
Throughput tester
Which tools measures connectivity
Ping
Name the different ping tools
Ping Path Ping Tracert Netstat Wireshark Nagios
What are the categories of network monitoring tools
Status
Traffic
Route
What are some status monitoring tools
Ping
nsloookup
Name a traffic monitoring tool
ping
iptrace
What is a route monitoring tool
tracert
Network Traffic Analysis
s
Network Diagnostics
d
System Performance Monitors
Monitors state of services/daemons, processes and resources
Tracks one or more counters
Which monitor watches services /daemons/resources
System Performance Monitors
Name some counters monitored by system performance monitors
Bandwidth counters
Storage counter
Network device CPU counter
Network device memory
Can system monitoring tools monitor NIC status
Yes
Describe the Syslog
Process of logging messages or data logs
What is a log file
REcord of actions and events performed on an operating system
Which file do you need to look at if you want to assess the operating system
Log file
What are the types of log files
System
General
History
System log files
Predetermined by the OS and are a record of events logged by the OS
General log files
Contains information about device changes, installation/uninstallation of device drivers and any other system changes
History log files
- Types of log
- The event of the occurrence
- The name of the user who was logged on at the time of the event
- Keywords
- What category the event belongs to
Describe a network analyzer
Packet or protocol analyzer or packet sniffer
Hardware or software
Intercepts/Logs/Analyzes data and packets across the network
ID ports
Can network analyzer be used on LANs and DSL
Yes
What is log management
Process of dealing with computer log messages
Can be used to monitor network health and troubleshoot issues
Log management Tools
give you more control and options for filtering and managing logs
Fault Tolerance
ability of a device to withstand a foreseeable component failure and continue to provide an acceptable level of service
Name some fault tolerance measures
Power
Disks and storage
Network components
Describe Alerts
notification that sent to a preconfigured user
Alert conditions are configurable
Power monitoring tools
Monitors the power that supplies the network
What is DCIM
Data Center Infrastructure Management
Extends traditional data center management functions
Includes physical assets and resources found in the facilities and IT Domains
Rack monitoring
sensors to monitor the ambient conditions in a rack system
Temp
Humidity
Interface monitoring
Feature usually built into a switch router or server
Usually monitors TX/RX/Packet errors/Link Status
Wireless Analyzers
Used to analyze the physical aspects of wireless networks
Includes: Spectrum analysis Finding WAPs Reporting SSIDs Channel Usage Signal strength Noise Sources
Wireless Heat Maps
Coverage maps
Red = good coverage Blue = bad coverage
Topic B
Topic B
What are the three types of configurations
Static
Running
Planned
Describe configuration management
focuses on maintaining a database of the hardware and software components on a network
Admins should have access to these types of documents
Network diagrams Device Information Utilization Statistics Policies and procedures Graphing Vendor docmentation
Physical Network Diagram
Graphical representation of gthe location of all network devices and endpoints and depicts their connection with one another
Does not show the exact location of devices
Which diagram depicts routers switches servers workstations firewall WAPs cable mgmt. info and CSUDSU units
Physical Network diagram
Describe a wiring diagram
Combination of a floor plan and a physical network topology diagram
Logical Network Diagram
Documents the protocols and application that control the flow of network traffic
Shows IP addresses, FQDN, Server application type, Trust relationship[s and routing topology
What is Asset Management
Policies about financial and contractual specifications of all the hardware and software components in the inventory
Critical Hardware Inventory is
Provides insurance documentation and helps determine what you need to rebuild the network
Standard Workstations Specialty Workstations Basic servers Connectivity hardware Backup hardware
Critical Software Inventory is
Provides insurance documentation and helps determine what you need to rebuild the network
Operating System Software Productivity and Application Software Maintenance Utilities Backup Documentation Overall Asset Inventory
What is a network policy
Formalized statement that defines network functions and expectations for users, mgmt. and IT personnel
Name the types of a network policy
Policy Statement
Standards
Guidelines
Procedures
Outlines the plan for individual components
Policy statement
Defines how to measure the level of adherence to the policy
Standard
Suggestion, recommendations or best practices for how to meet the policy standard
Guideline
Step by Step instructions
Procedures
Legal issues affect which groups
Employees
Customers
Business Partners
Name the common business document to consider for the networek
SLA
MOU
MLA
SOW
SOW
Statement of Work
MLA
Master Liciense Agreement
MOU
Memorandum of Understanding
SLA
Service Level Agreement
Network baseline is
Performance statistics under normal operating conditions
Describe steps in the change management process
- Identify the problem
- Document the rationale for the change
- Create a change request
- Work through the approval process
- Plan the change
- Implement the change
- Document
Topic C
Topic C
QoS
Quality of Service is a set of parameters that controls the quality provided todifferent types of network traffic
What are the QoS parameters
Max delay
Signal Loss
Noise
Bandwidth Priority
CPU usage
Are QoS parameters agreed to by the TX (ISP) and RX (Subscriber)ends
Yes and this is documented in a SLA
The QoS SLA defines
Parameters
Remedial Measures
Penalties
Are FTP and Telnet sensitive to packet loss
Yes
Are FTP and Telnet tolerant to data delays
Yes
Name some QoS parameters
Bandwidth Latency Jitter Packet Loss Echoes
Latency Sensitivity
Being sensitive to packets being delayed during transmission
n
Name some Latency sensitive applications
VOIP
Video Teleconferencing
Real Time Applications
What tricks can be used to reduce latency and add efficiency
QoS
Load Balancing
Traffic Shaping
Caching
What is traffic shaping
Mechanism in QoS for introducing some amount of delay in traffic that exceeds an administratively defined rate
It smooths down traffic bursts
Traffic is buffered and released after a specific time interval
Does traffic shaping drop packets
No
Where is traffic shaping implemented
On the outbound interface of a device
Where is traffic policing implemented
Both outbound and inbound interfaces
What is traffic policing
governing/regulating the packet flow within standards and limits
What happens to packets not conforming to the SLA
They are dropped or marked to a lower precedent
Packet shaper
aka Traffic shaper is the mechanism that enable traffic shaping
Delays metered traffic by using algorithms
Load Balancing
dividing work amongst devices on the network
Are load balancers stand alone devices
Yes
CARP
Common Address Redundancy Protocol
Allows a number of devices to be grouped together to use a single virtual NIC
High Availability
Rating that expresses how closely devices approach the goal of providing dat availability
Five nines
(99.999%)
Caching Engines
Application or service that stores or indexes data in order to provide faster responses to requests
High Bandwidth Applications
software that needs a lot of bandwidth
VOIP
HDTV
Real Time Video
Multimedia
What can effect QoS implementation
Packet classification
Policing
Resource Allocation`
Completed
Completed