Tuesday, April 2, 2019
Benefits of Network Management Tools
Benefits of Ne 2rk wariness Tools1. IntroductionThese be the various web solicitude tools partd by web manager to verify profit connection, supervise net income parcel of lands, break apart captured packets, troubleshoot net connectively failure, diagnosing meshing slow murder and identify bug of incident in order to even disclose the cyberspace avail satisfactory 24 hours seven days a week.1.1 Benefits of Net body of work Management ToolsNetwork manager benefits from network monitoring tools in so much ship mode as described downstairsEasy migration from old legacy action to new technologiesFor interpreter when network executive director is migrating form a legacy IOS based natural covering to LWAPP using Airwave Management syllabus softw atomic number 18 tool for wireless network management, net work executive director is volunteerd with centralized require for Wi-Fi networks where roaming discipline and information as closely as historical infor mation are kept as airwave gives a common platform to manage the devices. This is beneficial to the network manager be effort it makes it at large(p) for migration from old legacy applications to new technologies and makes it easy to monitor the network utilization all(prenominal)(prenominal)(a) the ageQuick identification of network or emcee failure when the emcee of a carriageion of the network is down, before drug users lead to nonice the failure network decision maker receives a warm and ascertain the fault and providing the network manager with means of monitoring and providing network handiness round-the-clock.Using network-monitoring tool give care ipMonitoring with attributes such as such as reporting, user tracking, vex menstruation form management and rogue AP disc all everyplacey, network administrator is able to monitor any networked device on the corporeal intranet and TCP/IP LAN and receive sprightlys immediately depending the administrators conf iguration of receiving alerts this give the sack be authorized through alarm, e-mail, or third-party software when a connection fails.Diagnosis and troubleshooting,Network monitor lot be apply to constitute why the waiter computer is non communicating with the thickenings computers on the network on a local world network, for model network administrator freighter configure network monitor to capture all the frames on the network, this includes source and finishing address of the computer sending and receiving frames, communications communications communications protocols employ as well as part of message direct. Net work administrator analyses this information to locate the source of problem on the network and troubleshoots it.Checking for connectivity of a computer online for exemplar using ping command to check if a computer is online divine services network manager for compositors boldness when user calls and said they lowlife logon to networked computer to tro ubleshoot and diagnose the network manager uses ping to find break through if the computer in on the network or not. This is beneficial to the administrator be m separate it helps him to identify where the problem is originating.1.2 Structure of management informationStructure of management information is a network comp 1nt used in network management which is used in simple network management its primary(prenominal) role is to define set of module identity, bespeaking type and recounting type. Structure of management information shows how related managed fair games such as object names, types of entropy that buns be stored in an object and how its transmission all over the network for sheath action done to retrieve vale of an object with codes2. Use Datagram protocolUser infogram protocol is a enthrall bottom protocol that is used to send packets to computers in networked surroundingss. User Data Protocol has the following advantages over elicitalise Control Protoc olConnectionlessWhen communicating with two computers on the network, user info protocol doesnt negotiate connection betwixt the two client computers but just transfers data as its receivedNo Connection StateUser data protocol doesnt maintain and doesnt keep track of any parameters such as buffers move, over-crowding control and rate which data is transfer for example when used in server environment, user data protocol is able to support more active agent clients if a particular application is bucket along over it because it doesnt acknowledge packets being sent or received.Small packet header over headUser data protocol has got a littler header of 8bytes of overhead making it faster in transferring dataUnregulated send rate, user data protocol doesnt have congested control mechanism and data is sent at rate, which it has been generated by the application in use for example taking into account the CPU, clock rate at the source of data.2.1 Applications horizontal surface pr otocol used by User data protocols as Transport floor protocolDomain Name ServiceIs a database like that converts the computers fully qualified domain name that are easy to be re sections such as www.yahoo.com into IP address such as 201.171.25.0. 6 that are because used by computers to connect/ communicate with from each one oppo officeS grouping mul convictiondiaThis is the continuous transfer of characterisation, character and digital data that is received and showed/displayed in real time for example podcast and webcastR forthing protocolRouting protocol is used to gibe which path to be used to sent/ transmit data packets across a network.2.2 Reasons why UDP is preferred over TCPDomain Name ServiceUser data protocol is preferred over transport control protocol because its used by DNS for name queries and because the information exchange between UDP and DNS is small in size of it for example the packet size sent through UDP is not great than 512 bytes.Streaming multimedi aStreaming multimedia its used by UDP because it compresses auditory sensation files in to small packets of data that makes it easy to transmit and continuously float and transmitting audio files whenever their audio data drops. This doesnt break or cause delay on audio broadcast. The streamed data is sent by the server application to the client application stores the stream data the thusly displays the data received in real time or playing the voice streamed files as soon as its buffered.Routing protocolOn routing protocol, User data protocol is preferred because routing table updates are sent periodically and close to of the data is lost a long the demeanor and updates need to be resent so its up to date on network layer which is unsufferable with transport control protocol2.3 Controversial use of UPD in multimedia applicationsThe use of user data protocol for streaming quaternate media application is controversial because user data protocol doesnt have congestion control w hich is practically needed to prevent the network from going into a state in which less or no work can be done, for example if a users sends high s rate video are sent without using congestion control, user volition be unable to see the video messages because of the packet overflow at the router.2.4 adaptational congestion control stratagemOne scheme that would force the use of adaptive congestion control is real time communication scheme which has grammatical construction reliability into applications that allow for force the use of congestion control, for example in meandering(a) application where congestion control is make though the application run over user data protocol, it acknowledges and retransmit packets that labor loss during transmissionApplications that perform congestion control user the network more efficiently for example with bits rates being controlled, the network will not go into a state where it can not be used2.5 Advantage of Adaptive congestion sche meBetter accomplishment of the network for example in the role of video when small bit are sent and controlled, the performance improves as the bandwidth will be plentiful to support bit ratesIt ensures that all packets sent reach destination3. Exchange between Dhcp master of ceremonies and Client ComputersDHCP Server and Client Computers larn vermiform handle (i)For clients to receive IP addresses from dhcp servers TCP/IP need to be con figured to get IP addressed mechanically on the TCP/IP properties dialogue box.Dhcp client computers that are configured to fetch IP address automatically request and receive IP configuration upon booting the client computer.Dhcp clients get IP addresses and other configuration each time the client computers are started and join the network. Dhcp server assigns IP address to a client from a predefines scope for a given duration of time and if that duration expires the IP address is released to the scope and can be designate to some other cl ient but if the duration is longer than the lease time, the client requests for and extension before the lease expires.3.1 Router and ComponentsA router is a device that connects one or more computer to create a network environment for example a modem. A router has the following major componentsInput portIs the dapple is direct connection for physical think and it is the point at which incoming packets enters the port. Input port runs functions such as performing the data plug into layer encapsulation and encapsulation, a route lookup and sending packets to turnout port via chemise fabric as well as proving in all tone of helper guarantees input port classify the in a predefined operate levelOutput portOutput ports stores packets that are for protect via the switching fabric and transmits or schedule packets for service on an output link performing both the reverse data link and physical link functionality as done in input portSwitching theoretical accountThis connects in put ports and output portsRouting processorExecutes routing protocols, creates and forward routing tables which is used in packet forwarding and performs management functions inwardly the router.3.2 net income Protocol reading material 4Internet protocol version 4 is the protocol that is widely in use in most corporate networks and it uses network layer protocol and its used as net incomework layer protocol on the internet3.3 Internet protocol version 6Internet protocol version 6 is the update version of internet protocol version 4 with much more address put. Its mostly used on the internet deck up in Asian countries.Protocol Structure of an IPV4 headerSee Appendix (i)Protocol Structure of an IPV6 headerSee Appendix (iii)Due to the depletion of internet protocol version four and lager routing tables, internet version 4 has been updated to version 6 that provides better hostage, more address space. This has made internet version 6 more advantageous in both(prenominal) ship c anal as discussed below.Internet protocol version 6 address space3.4 Advantages of internet version 6Internet protocol version 6 has got more address space as compared to internet version 6 for example version 6 has got 128-bit address space which allows for flexible origination of multilevel, hierarchical and routing infrastructure which is not that possible with internet protocol version 4Internet protocol version 6 has got in built guarantor which is regulation and mandate, its offered in all implementation and has no changes the application, for example security measure features such as earmark on packet sign language , data encoding and end-to end DHCP, DNS and IPv6 mobility is provided for in security model.4. Wired like PrivacyWEP is the short term for Wired alike Privacy for a security protocol used in wireless local range network that operates at a data link layer and has a security that can be turned of and on over again as defined in 802.11b patterns. This stan dard has been set by the Institute of galvanic and Electronics EngineeringThe main aim of wireless equivalent Privacy was to provide security via 802.1wireless network where data is sent from one end point to another. For example Key security features of WEP was meant to offer the followingConfidentiality piano tuner Equivalent Privacy is used to prevent data transmitted on the network from being eavesdropped by some whom the information is not meant to be communicated. wildcat access to wireless networkWireless Equivalent Privacy used to prevent unauthorised access to the networkData wholeness, to prevent the accommodation of data being transmitted4.1 Advantages of Wired Equivalent PrivacyWEP uses a 2.4 gigahertz radio frequency which provides clear signal for its lower than other frequencies and can travel through wall without affecting frequency.WEP is relatively be effective for example the cost of a router and Wi-Fi card is normally below 55 which makes it cost effective for both big corporations, and stem users4.2 Disadvantages of Wireless Equivalent PrivacyStatic encryption receive which is used by all the devices on the network make it very easy for packets to be intercepted and crack what the light upon is making it very vulnerable to hackers. For example when a router is set up on the network, the encryption used by the router is then used by almost all the device on the networkWeak keys made it easier for it to guessed and cracked when used at the access pointInitialisation vector in WEP is also ways reused, for example if a user who connects with WEP to access wireless network uses the analogous key over and over changes, this key can easily be crackedWEP has its algorithms sent in plaintext which makes it a lot easier for key streams to be resolute4.3 residuum between WEP and WPAWireless Equivalent Privacy standard 802.11 and Wireless fidelity Protected admission fee are different in so many an(prenominal) ways for exampleWEP uses 128bit with 24 law honour, term WPA used 128 incinerate with a 48 bit integrity value.WPA has features such as temporarily Key righteousness Protocol which dynamically changes the keys used for encryption while Key in WEP are static and is shared by all device on the network.The combined used of 48bit integrity values and TKIP, AES makes WPA more security strong as compared to WEP.Weak keys made it easier for it to guessed and cracked when used at the access point.Initialisation vector in WEP is also ways reused for example if a user who connects with WEP to access wireless network uses the alike key over and over changes, this key can easily be cracked.WEP has its algorithms sent in plaintext which makes it a lot easier for key streams to be determinedThese weaknesses among others called for a better standard to be adopted which will provide wireless network with better security and this led to the improvement of 802.1 to WPA.4.4 Wireless Fidelity Protected AccessWPA stands f or Wireless Fidelity Protected Access for local area network base on the specification of 802.11. This standard was designed to improve on the security weakness of Wired Equivalent Privacy.4.5 Advantages of WPAWPA provides added authentication features to basic WEP which provides for stronger encryption mechanisms. The added features includes Advanced Encryption standards protocol as used in WPA2, Temporary key Integrity Protocol as used in WPA.When use in windows 2003 environment, WPA provides the strongest wireless security.WPA has tail end ward compatibility for older applications that use WEP this doesnt call for upgrade.The use of 802.1x Radius servers provides administrators with means of auditing and log incidents.4.6 Disadvantages of WPAThe set up of the pre-shared key is difficult and it not beneficially to home users with less technical knowledge.It has more over head as compared to WPE.Its mismated with pre 1998 windows operating brasss and doesnt support older firmwar e.Its major fall is the denial of service attacks which can leave the whole network shutdown collectible to invariable different keys that are generated and interpreted by the network as some kind of attack.4.7 Comparing WPA and WEP featuresWPA has enhanced featured that is based on WEP standard. The features in WAP include temporarily key integrity protocol and 802.1 x. This features provides dynamic key integrity and mutual authentication to most wireless local area networks48-bit initialisation vectorsLike Wireless Equivalent Protocol, Temporal Key Integrity Protocol uses the RC4 stream cipher provided by RSA security for frame soundbox decryption and CRC for each frame before transmission but the residual here is that WPA has added feature Temporal Key Integrity Protocol that uses a 48bit initialisation vectors that has reduced the re-use of initialisation vectors. This has brought about data confidentiality.While WEP encryption is based on 128bit with 24 integrity value, wh ich means the keys are of smaller size and integrity value making it easy for hackers to crack the keys as the initialisation vector seeds to WEP algorithm coded, this feature has been enhanced by the 48 bit integrity vector in WPA. Data Encryption When data packets are sent, it encrypted separately with RC4 cipher stream, generated by b4 bit RC4 key, the key represent 24 bit initialisation vectorPre-Packet key Construction and statistical distributionWPA generates a new encryption key automatically for each client, for example WPA uses unique and different key for each 802.11 frames and avoid the use of same key as in WEP. This automatic key generation makes it impossible for WPA keys to be cracked by hackers While in WEP the same key is shares by all the devices on the network is static which means due it its unchanging nature, its a lot easy for the shared key to be modifiedMessage Integrity codesThe use of Michael prevents against attacks and forgeries, WPA uses a secrete 648bi te authentication key that will be shared only between the source and destination where during the process of authentication tagging function takes place and message integrity code. For forgeries to be identified, the destination receiver inputs source into verification predicate and creates another tag code and it this both matches then the message is considerers authentic is created to detect bit flipping and changes to the source and destination.Unlike WEP that uses 4 byte integrity check value to the standard payload. The receiving client calculates the integrity check value and if the values do match then there is a chance that frames were not treated with and in case dataCounter mode/ CBC-MACThis is a data confidentiality protocol used for packet authentication and data encryption. For confidentiality for example CCMP uses the groundbreaking encryption standards in counter mode and for encryption and data integrity CCMP deals with Cipher Blocking Chaining Message Authenticat ion Code making this standard more good as compared to WEP which has got no encryption modeEAP encapsulation over LAN, this is the key standard use n key exchange that is not used in WEP for example this protocol allows for a four way key handshake as well as a separate key handshake while in WEP there is only a two way key handshake.The IEEE802.1x as used in WPA2 provided a sure means of authenticating and controlling user traffic to secure networks5. A cataclysm convalescence PlanIs the process of restoring access to the main bank line applications, data, hardware and software that is call for to start the dodge surgeryal, hazard Recovery Plan provides information on how to handle information that whitethorn be lost or corrupted during the happening as well as proving police squad up leaders with procedures of restoring information and data.5.1 Major steps in chance retrieval processNotification procedureThis is the action taken by calamity team members as soon as e mergency occurs. In the notification horizontal surface, systems can be desexd functions on a limited basis. For example in a data centre when database team leader receives alert on his/her computer that a file within the database is corrupt, this alert can be sent to the team assessment team either automatically by the system or mailed to the assessment team to analyse the traumaAnalyse the extent of the damageThe analysis of the damaged cause should be done as soon as possible to determine the level of damage to the applications for example if it a power blow out of the water has occurred in the data centre, the analysis should be able to detailed the applications modify, origin of the incident, work areas that have been affected and if there is another source of power to run the database the this can be powered on for example in case there is UPS relief while further investigation in the outrage is carriedActivation of the computer programDepending on the damage cause by d isaster and the out come of analysis, the disaster recovery team can make a decision to activate the devise. For example in the case of data centre if the entire database server is down, the team looks at the possible way that the system can be restored with a minimal time, inventionning for team communication procedures, then the respective team leaders will make known provide members about and start work on their respective tasks to restore the system as agreed by the team members.Execution stageRecovery process at this stage can be looked at under Sequence of Recover activities and Recovery procedures and depending on what has been defined in the data recovery excogitation for example in case of guild database, this can be done manually while recovery process is doneSequence of Recovery activitiesRecover process should be carried out according the priority of each disaster and level of disaster damage from the results got from the analysis. For example if the database sev er is recovered and this is the main slender business system, then this should be restored first before other servers and all the disaster recovery team should carried out the restoration process as in the disaster recovery plan,.If the business has to be transferred to another invest then the critical files associated with the service has to be transferred depending on the plan. For example a plan to transport IT equipment and grave data files.Recovery processThis includes having access to the damaged IT equipment in case of the data centre this could database servers, corrupt files, informing users of the applications, getting backup if its not in house, restoring critical systems such operating systems, SQL database, testing the system before if goes mental processal and connecting the system on the network and informing uses of the application of the success of the restoration.Rebuilding processOnes the recovery process has been usefully, the disaster team recovery embarks o n the process of transferring all the data recovered back to the original system, or may be totally system that can high hat support the functionality of data service being offered. The disaster recovery team will continue to monitor for any reoccurrence of incidents, make the prerequi spot network and infrastructure connections, bring down the contingency system upon which the application was running and when the all system is stable the data centre mental faculty can be able to use the original system afterwards full restoration of dataUpdate the disaster recovery planIf new procedures are find out during the process of recovery, its updated on the recovery plan documentation which will be used again in case the same disaster occurs again5.2Business pertinacity and Disaster Recovery PlanThe IT business continuity and disaster recovery plan for the IT segment that I currently work in seeks to deal with the how best to handle emergency in the event of disasters and how best t o minimise endangerment of damage, provide emergency services and recover to normalcy of service operationsThe Business Continuity Institute defines business continuity planning as A holistic management process that identifies potential pertains that threaten an arrangement and provides a framework for building resilience with the capability for an effective receipt that safeguards the interests of its key stakeholders, reputation, brand and value creating activities5.3 Aims of Business Continuity Planning opposeing a disasterAt the initial planning stage, the critical areas of service operation of development technology is identified, for example within the Information Technology department where I work, servers for crucial systems, hot sites and training of the disasters team leaders are laid down. This initial planning stage is carried out with the aim of minimising the impact of disasters on Information technology resources and services this also ensures that the departmen t is able to recover as fast as possible from a disaster.ContinuityThe procedure of running a Information services using borderline resources during a disaster, this prevents the memorial tablet from being put out of services both internally and externally. For example running applications for only crucial systems to continue operation while recovery is on the processRecoveryThe procedures that are required to restore all systems and resources are identified. This helps in bring all the resources and system to full operation, for example backing up data from off site centre.5.4 Contingency Plan activationThe activation of the organisations IT service continuity plan can be started at any time.The decision of activating the plan will be the sole responsibility of Estates and auspices department with the partner of officer in charge and contingency plan can not be started without the instruction being issued by Estates and security department with service from the Officer in char ge.In case emergency occurs during business working hours, members of disaster recovery team will be gathered and depending on the level and mature or damage the Information technology team will be contacted If the emergency occurs out of business working hours, security is required to call the head of security or his/her police lieutenant who will get in touch with the disaster recovery team with the help of the officer in charge and then the decision to initiate the Information communication technology business continuity planIf the team leaders are not available in the event of the emergency the deputy will take the responsibility and in the event where both the team leader and deputy are not available, next person on the list takes responsibility.5.5 Emergency Management team upTeam leader query of information Technology department who is responsible for over seeing all the information system servicesDeputy team leader Systems coach obligated for all the systems applications such as the servers, back up and matter between the off sites third party centresTeam member Database decision makerResponsible forInternal databases and well as internal sitesEnsure that a domain account has been set up for the SQL services.The admin backup and standard jobs from SourceSafe InstallationSQL Server 2000Customise the jobs to ensure that server names and paths are correctTeam member Information Technology Security officerResponsible for the security of the internal sites and well as blocking unsafe sitesTeam member Network EngineerResponsible for network connectivity and test our network devices from within our networkRun test network script using state of matter commandTest access to the web services-Use government secure intranet network PC or dial-up PC belonging to web team in OCPD to check connection to all websites-Use nslookup to connect to wb-dns1 internal to the organisation and check that website names can be resolvedTest e-mail-An email should be sent to emailprotected and echo. These should respond by sending an email back5.6 Disaster Recovery PlanIs the process of restoring access to the important system data, hardware and software that is required to start the system operational, Disaster Recovery Plan provides information on how to handle information that may be lost or corrupted during the disaster as well as proving team leaders with procedures of restoring information and data.5.7 The main Objectives of the Information Technology Recovery TeamThe Recovery Teams main duties/ task are toPrevent damages to Information Communication InstallationsDecide the requirements of senior management for other departmental Recovery Teams and work accordingly to meet the requirements.Carry out tasks that lead to the provision of restoring all Information Communication service to northward as started by the Recovery Team within the disaster constraints or limits.5.8 Disaster Recovery TeamTeam leader Head of Estates and SecurityResponsible f or the safe of the building as well as supply and members of the publicDeputy team leader Site ContractorResponsible for building and central serviceTeam member Head of securityResponsible for staff and public safety5.9Recovery SiteThe recovery site will be informed by the Information Technology Departmental recovery team leader and the assistant by Disaster recovery Team in case the team leader is absent. The site is locate about 3 miles a way from the organisation, In case of well(p) incidents, the site can be contacted by information recovery mobile phone.6. AssumptionsWith regard to the following case scenarios below, the disaster recovery team can take actions base on case scenario that is relative to the real disaster. Its the organisations indemnity that when incidents occur, staffs are evacuated from the building and entry to the site is not permitted unless staff members are informed by head of Estates and Security.6.1 Case Scenarios building Non-disruptiveThese case sc enarios may includeDisaster in the staff car park not affecting the buildingGas licking the building basement distrustful package found in the public lockersBuilding is partly ruinedScenarios in this case may includeFlood affecting the whole buildingApart of the sever get on that supports site B of the building is partly destroyedA part of fame means in site A where frame cabinets E8a and E8b are located is partly destroyed.IT store direction is also partly affected.Building is completely destroyedScenario in this case isServer Room on site A of the building including cabinets room E1 and E2 are completely destroyed.6.2 Building Non-disruptive6.3 ActionsIn these case scenarios, all the information technology equipment are not destroyed. The disruption did call for evacuation of staff for healthy and safe issues and as soon as the build is clear safe, staff members will be allowed in and operations will resume.6.4 Building is partly destroyedIn these case scenarios, some IT equipm ent are affected partly, it may escalate to a major for example the part demolition of server room in site A and the cabinet room where E8a and E8a may cause staff on this site to loss access to network resources. Here nothing can be done manger staff members are not allowed to enter the building. Ones members are allowed in the building, all the equipment in the area affected can the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment