Network Administration - PowerPoint PPT Presentation

1 / 34
About This Presentation
Title:

Network Administration

Description:

Makes quick recovery from data loss easy ... Based on standard terminology for RAID (Redundant Arrays of Inexpensive Disks) arrays ... – PowerPoint PPT presentation

Number of Views:267
Avg rating:3.0/5.0
Slides: 35
Provided by: garybr4
Category:

less

Transcript and Presenter's Notes

Title: Network Administration


1
Network Administration Support
  • Chapter 12

2
Learning Objectives
  • User accounts and groups
  • Network performance monitoring
  • Data security management

3
Responsibilities of Network Administration
  • Install and troubleshoot hardware
  • Ensure that the network performs to
    specifications
  • Verify that users can easily access the resources
    they are authorized to use
  • Monitor network traffic
  • Be responsible for security issues

4
Managing Network Accounts
  • A main task of network management
  • Make sure all users can access the resources they
    need for their work, but cant access other
    resources
  • Principles of user management are similar, but
    the management utilities are different in the
    various NOSs

5
User Accounts and Group Accounts
  • User account
  • Collection of information about a user
  • Account name
  • Associated password
  • A set of access permissions for network resources
  • Group account
  • Umbrella account to which individual accounts may
    be assigned to grant them a predetermined set of
    rights

6
Creating User Accounts
  • Decisions relate to
  • Passwords
  • Logon hours
  • Auditing
  • User rights

7
Passwords
  • Should users be able to change their passwords?
  • How often should they be changed?
  • How many letters should the password contain?
  • How often should users be able to reuse their
    passwords?
  • Should failed attempts to log on lead to account
    lockouts?

8
Logon Hours
  • Should users be restricted to logging on during
    certain hours of the day or only on certain days?

9
Auditing
  • Should user actions be tracked?
  • To what degree?

10
Setting User Rights
  • User rights
  • The actions that particular accounts have
    permission to perform
  • Most operating systems come with default groups
    with pre-defined rights

11
Groups with Pre-defined Rights
12
Windows Server 2003 Tool
13
Linux Permissions Tab
14
Monitoring Network Performance
  • Some characteristics often monitored
  • Data read from and written to the server each
    second
  • Security errors (errors accessing data)
  • Connections currently maintained to other servers
    (server sessions)
  • Network performance parameters

15
Network Performance
  • Windows Servers and Workstations have four tools
  • Event Viewer
  • Task Manager
  • Performance Monitor
  • Network Monitor
  • Linux has comparable open source (free) or
    shareware (low cost) utilities

16
Event Viewer
  • A Windows tool that records events in three logs
    based on the type of event
  • In Administrative Tools folder

17
Event Viewer Logs
  • Security information
  • Records security events based on the filters you
    set up
  • Most useful for getting more information about
    failed attempts to log on or access data
  • System information
  • Records events by Windows system components
    provides basic information about how the network
    runs and whether all hardware works properly
  • Events generated by applications

18
Event Viewer Logs
19
Task Manager
  • Quick summary view of network performance
  • Use Ctrl/Alt/Del then click Task List button

20
Task Manager
21
Performance Monitor
  • A Windows tool used for graphing trends, based on
    performance counters for system objects
  • In Administrative Tools folder

22
Performance Monitor
23
Network Monitor
  • A Windows network service that you can use to
    capture frames.
  • Not installed by default.
  • Records source address, destination address, and
    other information in headers and footers.
  • Protocol analyzer.

24
Network Monitor
25
Maintaining a Network History
  • Keep long-term records of network performance and
    events so you can determine trends or notice when
    a new problem arises

26
Managing Network Data Security
  • Elements for avoiding data loss
  • Ensure that data is safe from intruders (covered
    in Ch. 10)
  • Ensure that you can replace destroyed data

27
Avoiding Data Loss
  • Accomplish data protection with a three-tiered
    scheme that
  • Reduces the chance of data loss
  • Makes quick recovery from data loss easy
  • Allows you to completely rebuild lost or
    corrupted data (disaster recovery)

28
Backups
  • Tape - Offers a useful combination of respectable
    speed, high capacity, and cost-effectiveness
  • Widely supported by tape-backup software
  • Cannot act as a separate drive
  • Other common backup media optical drives and
    magnetic drives.

29
Aspects of a Successful Backup Plan
  • Combine a full weekly backup with daily
    differential or incremental backups
  • Monitor backup process regularly
  • Ensure that you can restore the data

30
Uninterruptible Power Supply (UPS)
  • A device with a built-in battery, power
    conditioning, and surge protection
  • If the power goes out, the charged battery takes
    over long enough for you to perform an orderly
    shutdown

31
Fault-Tolerant Drives
  • An arrangement of disks such that, if one disk
    fails, the data remains accessible without
    requiring restoration from backups
  • Based on standard terminology for RAID (Redundant
    Arrays of Inexpensive Disks) arrays
  • Most popular
  • Disk mirroring (duplexing) RAID 1
  • Disk striping with parity RAID 5

32
RAID 1 Disk Mirroring
  • Requires two disks, configured to work in tandem
  • If one disk fails, then the data remains
    accessible
  • Simple to set up and makes recovery from disk
    failures easy
  • Requires twice as much disk space

33
RAID 5 Disk Striping with Parity
  • Parts of several physical disks link together in
    an array data and parity information are written
    to all disks in this array
  • If one disk fails, the data may be reconstructed
    from the parity information written on the others
  • Uses space efficiently
  • Does not recover data as quickly as disk mirroring

34
Chapter Summary
  • Managing networked accounts
  • Managing network performance
  • Managing network data security
Write a Comment
User Comments (0)
About PowerShow.com