+ All Categories
Home > Documents > Komunikasi Data Dan Jaringan Komputer - Pertemuan 6

Komunikasi Data Dan Jaringan Komputer - Pertemuan 6

Date post: 14-Nov-2015
Category:
Upload: edy-gozali
View: 218 times
Download: 3 times
Share this document with a friend
Description:
jaringan
Popular Tags:
30
Network Development Life Cycle The NDLC depends on previously completed development processes such as strategic business planning, applications development life cycle, and data distribution analysis. If an implemented network is to effectively deliver the information systems that will fulfill strategic business goals, then a top-down approach must be taken.
Transcript
  • Network Development Life Cycle

    The NDLC depends on previously completed development processes such as strategic business planning, applications development life cycle, and data distribution analysis.

    If an implemented network is to effectively deliver the information systems that will fulfill strategic business goals, then a top-down approach must be taken.

  • Top-Down Model and NDLC

  • Information Systems Development

  • Systems Development and Network Analysis

    Network analysis and design is one step in an overall comprehensive information systems development

    process.

  • Network Designs

    Physical network designs involve the arrangement and interconnection of the

    physical network circuits and devices,

    whereas

    Logical network designs involve configuration and definition of services that

    will run over that physical network such as

    addressing schemes, routing schemes,

    traffic prioritization, security, and

    management.

  • Network Development Life Cycle

    The word cycle is a key descriptive term of the network development life cycle as it

    clearly illustrates the continuous nature of

    network development.

  • Network Analysis and Design Method

    The network analysis and design methodology

    should be looked upon

    as an overall guideline to

    the network

    development process

    rather than a step-by-

    step cookbook-style set

    of instructions.

  • Network Analysis and Design Method

    is consistent with previous information systems development models.

    business, application, and data requirements definition are prerequisites to network design.

    activities from various stages of the method often take place simultaneously.

  • Strategic Network Design

    Network design projects are not undertaken at random or on the whim of any network manager.

    Network design projects must be aligned with strategic business initiatives and/or the strategic development of the overall corporate IT infrastructure.

  • NDLC and Proposal Process

    It is often prudent to narrow the field of potential respondents by issuing a request for information (RFI).

  • In-House Network Analysis

  • Network Device Analysis

  • IT Infrastructure Management

    The achievement of management expectations depends on properly managed components of the IT infrastructure.

    An IT infrastructure is made of a combination of separately managed and monitored elements.

  • Komunikasi Data danJaringan Komputer :Network Management

    Aries KusdaryonoMagister KomputerUniversitas Budi Luhur

  • H-16

    Network Management

    Network management is the process of controlling a complex data network to maximize its efficiency and productivity

    Network Management define as monitoring, testing, configuring, and troubleshooting network components

  • H-17

    Network Management

    Network Management uses hardware, software, and humans

    The overall goal of network management is to help with the complexity of a data network and to ensure that data can go across it with maximum efficiency and transparency to the users

  • H-18

    Network Management

    The International Organization for Standardization (ISO) Network Management Forum divided network management into five functional areas:

    Fault Management

    Configuration Management

    Security Management

    Performance Management

    Accounting Management

  • H-19

    Configuration Management

    The configuration of certain network devices controls the behavior of the data network

    Keeping track of device settings and how they function

    Configuration management is the process of finding and setting up (configuring) critical devices

    Divided into two subsystems : reconfiguration and documentation

    Hardware

    Software

    User Account

  • H-20

    Fault Management

    Is the process of locating problems, or faults, on the data network

    Dealing with problems and emergencies in the network (router stops routing, server loses power, etc.)

    Divided into two subsystem

    Reactive Fault Management

    Detecting, Isolating, Correcting, and Recording Faults

    Proactive Fault Management

    Prevent faults from occurring (lifetime for computer or a part of a component)

  • H-21

    Performance Management

    Involves measuring the performance of the network hardware, software, and media

    How smoothly is the network running.

    Can it handle the workload it currently has.

    Examples of measured activities are:

    Overall throughput

    Percentage utilization

    Capacity

    Traffic

    Error rates

    Response time

  • H-22

    Security Management

    Is the process of controlling access to information on the data network

    Provides a way to monitor access points and records information on a periodic basis

    Provides audit trails and sounds alarms for security breaches

  • H-23

    Accounting Management

    Involves tracking individuals utilization and grouping of network resources to ensure that users have sufficient resources

    Involves granting or removing permission for access to the network

  • Versions

    Two major versions SNMPv1, SNMPv2

    SNMPv1 is the recommended standard

    SNMPv2 has become split into:

    SNMPv2u - SNMPv2 with user-based security

    SNMPv2* - SNMPv2 with user-based security and additional features

    SNMPv2c - SNMPv2 without security

  • What is SNMP?

    SNMP is an application-level tool (protocol) that allows for remote and local management of

    items on the network including servers,

    workstations, routers, switches and other

    managed devices.

    Comprised of agents and managers

    Agent - process running on each managed node collecting information about the device it is running on.

    Manager - process running on a management workstation that requests information about devices on the network.

  • H-28

    SNMP

    There are two approaches for the management system to obtain information from SNMP

    Traps

    Polling

  • H-29

    SNMP Traps

    When an event happens on a network device a trap is sent to the network management system

    A trap will contain:

    Network device name

    Time the event happened

    Type of event

  • H-30

    SNMP Traps

    Resources are required on the network device to generate a trap

    When a lot of events occur,the network bandwidth may be tied up with traps

    Thresholds can be used to help

    Because the network device has a limited view, it is possible the management system has already received the information and the trap is redundant

  • H-31

    SNMP Polling

    The network management system periodically queries the network device for information

    The advantage is the network management system is in control and knows the big picture

    The disadvantage is the amount of delay from when an event occurs to when its noticed

    Short interval, network bandwidth is wasted

    Long interval, response to events is too slow

  • H-32

    SNMP Traps/Polling

    When an event occurs, the network device generates a simple trap

    The management system then polls the network device to get the necessary information

    The management system also does low frequency polling as a backup to the trap


Recommended