8/9/2019 Network Chapter5 - Administration
1/32
7/17/2010
Lesson : 5
Network Administration
8/9/2019 Network Chapter5 - Administration
2/32
7/17/2010
Objectives
At the end of this session, you will be able to:
List the tasks included in network management.
Understand the requirement of user accounts in anetwork.
Appreciate the importance of monitoring networkperformance.
Identify some of the network management tools. Describe the methods of implementing network
data security:
Security models
Auditing
8/9/2019 Network Chapter5 - Administration
3/32
7/17/2010
Objectives (contd.)
Diskless computers
Data encryption Virus protection
Describe various methods to prevent data loss:
Tape backup
Uninterruptible power supply
Fault tolerance systems
8/9/2019 Network Chapter5 - Administration
4/32
7/17/2010
Network Management
Is required for an efficient functioning of thenetwork
Includes administrative tasks such as:
Creating and administering user accounts
Implementing and supporting network resources
Configuring the network
Monitoring network performance
Preventing and troubleshooting networkproblems
8/9/2019 Network Chapter5 - Administration
5/32
7/17/2010
User Accounts
Are created on the central domain controller
Are created for all users on the network
Are granted privileges to access the networkresources
Are composed of:
User name
Logon parameter
8/9/2019 Network Chapter5 - Administration
6/32
7/17/2010
Network Operating Systems
Have two accounts that are already created forthe user:
Guest account
Administrator account
8/9/2019 Network Chapter5 - Administration
7/327/17/2010
Administrator Account
Is the first account created by the installationprogram
Is the default account created for theadministrator
Has all the administrative rights that enable theadministrator to:
Start the network
Set initial security parameters
Create user accounts
8/9/2019 Network Chapter5 - Administration
8/327/17/2010
Guest Account
Is the default account created by the NOS
For those who do not have an account on the
domain controller Enables one-time users to access the computer
with minimum permissions
8/9/2019 Network Chapter5 - Administration
9/327/17/2010
Group Accounts
Have privileges granted to a group of users onthe network
8/9/2019 Network Chapter5 - Administration
10/327/17/2010
Needs to be monitored by the networkadministrator to:
Ensure satisfactory network performance Predict possible network problems
Prevent network problems
Detect bottlenecks in the network
Network Performance
8/9/2019 Network Chapter5 - Administration
11/327/17/2010
Performance Monitor
Is a utility offered by the Windows Server
Can be used to view operations in real time andrecord time
for the following: Processors
Hard disks
Memory
Network utilization
Can be used to record performance data
Can be used to alert the administrator in case ofnon-conformance to requirements
8/9/2019 Network Chapter5 - Administration
12/327/17/2010
Simple Network Management
Protocol
Is standard followed by network managementsoftwares
Environment has programs called agents That are loaded on to the following network
components that may require monitoring andinclude:
hubs servers
interface cards
routers
bridges
8/9/2019 Network Chapter5 - Administration
13/32
7/17/2010
Agents
Monitor network behavior
Store the information gathered in the
Management Information Base (MIB )
8/9/2019 Network Chapter5 - Administration
14/32
7/17/2010
Network Security
Is required to protect the network from:
Unauthorized access
Intentional or unintentional damage Data corruption
Models are of two types:
Password protected shares
Access permissions
8/9/2019 Network Chapter5 - Administration
15/32
7/17/2010
Password Protected Shares
Requires:
A password to be assigned to each shared
resource The user to type the password associated with
each shared resource
Access Permissions Security model involves
Granting of permissions to use a particularresource
P i i l h f
8/9/2019 Network Chapter5 - Administration
16/32
7/17/2010
Permissions control the type of
access to a resource
NO ACCESS
READ
READ
EXECUTE
WRITE
DELETE
NO ACCESS
User 3
User 2
User 1
8/9/2019 Network Chapter5 - Administration
17/32
7/17/2010
Auditing
Enables monitoring of network activities on useraccounts
Enables the recording of selected events in thesecurity log of the Server
Can record the following events in the Server:
Log on/off
Connecting and disconnecting from designatedresources
Terminating connections
Disabling accounts
Opening or closing files
8/9/2019 Network Chapter5 - Administration
18/32
7/17/2010
Diskless Computers
Are employed by organizations to implementnetwork data security
Do not have a: Local floppy disk
Hard disk
Carry out disk operations by using the servers
disk
8/9/2019 Network Chapter5 - Administration
19/32
7/17/2010
Data Encryption
Makes the data in the network cable unreadable
Permits the data to be decoded to normal
readable format at the receiving end
VirusProtection
Is required to prevent data loss
8/9/2019 Network Chapter5 - Administration
20/32
7/17/2010
Data Protection
Implies prevention of data loss
Can be ensured by:
Tape backup Uninterrupted Power Supply (UPS)
Fault tolerance
8/9/2019 Network Chapter5 - Administration
21/32
7/17/2010
Backups
Backups
Ensure data recovery in case of data loss
Are commonly taken on magnetic tapes because
it is: Reliable
Inexpensive
Can be performed
Daily
Weekly
Monthly
8/9/2019 Network Chapter5 - Administration
22/32
7/17/2010
Network traffic is reduced by
backing up to a separate segment
Isolated segment for backup
Tapedrive
Server
Server
Server
8/9/2019 Network Chapter5 - Administration
23/32
7/17/2010
UPS
Is an automated external power supply
Enables operation of an electrical device in the
event of a power failure Works on batteries
8/9/2019 Network Chapter5 - Administration
24/32
7/17/2010
Fault Tolerance
Duplicates data or places data on differentphysical sources
Allows data redundancy
To recover data in case of data loss
8/9/2019 Network Chapter5 - Administration
25/32
7/17/2010
Fault Tolerance (contd.)
Options are categorized into levels known asRedundancy Array of Inexpensive Disks (RAID)which are:
Level 0disk striping
Level 1disk mirroring
Level 2disk striping with Error Correction Code
(ECC) Level 3ECC stored as parity
Level 4disk striping with large blocks
Level 5striping with parity
Di k i i bi
8/9/2019 Network Chapter5 - Administration
26/32
7/17/2010
Disk striping combines areas on
multiple drives
192K
64K
64K
64K
Disk 1 Disk 2 Disk 3
8/9/2019 Network Chapter5 - Administration
27/32
7/17/2010
Level 0Disk Striping
Divides data into 64 K blocks
Spreads the data equally
In a fixed order
At a fixed rate
among all disks in an array
Level1Disk Mirroring
Involves the duplication of a partition
Transfers the duplicated partition to another disk
Disk mirroring duplicates a
8/9/2019 Network Chapter5 - Administration
28/32
7/17/2010
Disk mirroring duplicates a
partition on another physical diskDisk I/O
Disk mirroring software
8/9/2019 Network Chapter5 - Administration
29/32
7/17/2010
Level 5
Writes parity information to the disks along withthe data
Distributes the: Parity information
Data
throughout the stripe set
Striping with parity allows data
8/9/2019 Network Chapter5 - Administration
30/32
7/17/2010
Striping with parity allows data
reconstruction if a drive fails
Disk 1 Disk 2 Disk 3 Disk 4 Disk 5
Parityinformation
8/9/2019 Network Chapter5 - Administration
31/32
7/17/2010
Sector Sparing
Is also called as hot fixing
Is a fault tolerance system
In which sector-recovery capabilities areautomatically added to the file system
8/9/2019 Network Chapter5 - Administration
32/32
7/17/2010
Sector sparing or hot fixing steps
Detects bad sector
Moves data to good sector
Maps out the bad sector