09.12.2012 Views

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

• Configuration management—In large-scale <strong>network</strong> environments<br />

consisting of perhaps thousands of manageable nodes and devices,<br />

configuration and version control is essential. Incompatible versions of<br />

software can lead <strong>to</strong> many <strong>network</strong> and general interoperability-related<br />

problems. Configuration management systems poll <strong>network</strong> devices and<br />

create a database of <strong>the</strong> devices' hardware configuration and software<br />

versions. Additionally, <strong>the</strong>se systems provide facilities for performing<br />

software upgrades and installing new software packages. After an accurate<br />

configuration inven<strong>to</strong>ry is available for all <strong>the</strong> nodes on <strong>the</strong> <strong>network</strong>, <strong>the</strong><br />

database can be consulted when diagnosing system performance issues.<br />

These systems have become popular for large scale Windows NT<br />

installations, which do not support remote administration easily.<br />

Configuration management also entails managing <strong>network</strong> resources.<br />

Adding or removing nodes, manual traffic redirection, and service<br />

prioritization during periods of high <strong>network</strong> utilization are examples of when<br />

this kind of management would occur.<br />

• Accounting management—The computer <strong>network</strong> is a common<br />

enterprise-wide resource. It is common <strong>to</strong> bill various business cost centers<br />

or cus<strong>to</strong>mers based on <strong>network</strong> utilization. Accounting management in <strong>the</strong>se<br />

situations is also used for equipment depreciation and amortization,<br />

staff-related costs, and interdepartmental billing. This information can also<br />

be used for apportioning <strong>network</strong> resources between users. The his<strong>to</strong>rical<br />

data can be used <strong>to</strong> substantiate <strong>the</strong> need and/or establish a basis for<br />

justifying capital expenditures for new resources.<br />

• Security management—This is <strong>the</strong> function of implementing and enforcing<br />

<strong>network</strong> and computer security. The <strong>network</strong> represents a substantial<br />

security risk for any enterprise. Networking equipment, management<br />

systems, and access points must be adequately secured. This entails <strong>the</strong><br />

physical security for <strong>network</strong> equipment, <strong>the</strong> partitioning and securing of<br />

public and private data cabling, and <strong>the</strong> use of data encryption <strong>to</strong> transmit<br />

data between nodes and over public access links. The administration of a<br />

trusted third party or one-time password au<strong>the</strong>ntication system is part of<br />

this function, as well as <strong>the</strong> creation of an adequate security log and system<br />

event database.<br />

• Performance management—This process evaluates <strong>the</strong> performance of <strong>the</strong><br />

<strong>network</strong>. Ideally, <strong>the</strong> <strong>network</strong> should be operating in a manner that permits<br />

<strong>the</strong> connected nodes <strong>to</strong> process <strong>network</strong> transactions at <strong>the</strong>ir relative<br />

capacity. In order <strong>to</strong> ensure that <strong>network</strong> performance is maintained at an<br />

acceptable performance level, it is common <strong>to</strong> have service level agreements<br />

(SLAs) that govern <strong>network</strong> performance and availability. Performance and<br />

availability are measured using variables such as <strong>the</strong> following:<br />

o Number of CRC errors<br />

o Bit error rates

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!