Cisco s3c8
Download
1 / 13

Cisco S3C8 - PowerPoint PPT Presentation


  • 93 Views
  • Uploaded on

Cisco S3C8. Network Management. Documentation. diagrams that indicate the path of the physical wiring layout; the type of cable; the length of each cable; the type of termination for the cable; physical location of each wall plate or patch panel, and; a labeling scheme for easy

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Cisco S3C8 ' - vicky


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Cisco s3c8

Cisco S3C8

Network Management


Documentation
Documentation

  • diagrams that indicate the path of the physical wiring layout;

  • the type of cable;

  • the length of each cable;

  • the type of termination for the cable; physical location of each wall plate or patch panel, and;

  • a labeling scheme for easy

  • identification of each wire.


Documentation1
Documentation

  • Also includes:

    • Layout of MDF

    • Layout of IDF

    • Physical layout of rack mounts

    • Auxiliary equipment & servers

    • Patch panel labels

    • Identification and configuration of all equipment in MDF and IDF


Documentation2
Documentation

  • Also includes:

    • Server and workstation configuration details

    • Physical location

    • User

    • Network ID – IP address, MAC address

    • Subnet, Topology; IRQ, SMA

    • Software installed

    • O/S

    • Repair Record


Documentation security
Documentation / Security

  • Soft

    • User rights, password, firewall support

  • Hard

    • Locking MDFs and IDJs

    • Who has access to MDF and IDF

    • How hosts are protected

    • Who has physical access to system

  • Documentation needs to be updated


Data recovery
Data Recovery

  • UPS, Tape Backup, and Disk Arrays

    • Full, incremental, differential, copy and daily

    • Tape backup is cheap

  • Sequential Storage

  • Archive Bit

    • Allows for INCREMENTAL backup

      • Only backup what has changed since last backup date


Disk redundancy
Disk Redundancy

  • Raid 0 stripes data across multiple disks, no parity

  • Raid 1 disk mirroring – disk duplexing – writes data to two identical partitions

  • Raid 2 writes across multiple disks with error checking

  • Raid 3 stripes data one byte at a time- dedicated parity drive

  • Raid 4 stripes one sector at a time- dedicated parity drive

  • Raid 5 stripes data and parity across

    multiple disks


Environmental factors
Environmental Factors

  • Static

  • Contaminants – smoke, dust and dirt

  • Heat – high temperatures

  • Protection

    • Isolate transformers; use regulators and line conditions and UPS


Viruses
Viruses

  • Worm propagates itself

  • Virus infects files

  • Trojan disguised as a game, utility or application

    • Know where software came from

    • Don’t use unknown disks

    • Use current virus checker


Network types
Network Types

  • Peer-to-peer

    • Workgroup network

      • Small number of workstations

        • W95 W98 Lantastic

        • 10 workstations

  • Client Server

    • Controlled by a NOS (Network Operating System

  • Unix

    • NFS security , multitasking, kernel, supports many users


Network control
Network Control

  • User rights

  • Account numbers

  • Passwords

  • Access


Baseline measurements
Baseline Measurements

  • Bandwidth used

  • Collisions

  • Broadcast traffic


Scientific method trouble shooting
Scientific Method – Trouble Shooting

  • 1. Identify network/user problem.

  • 2. Gather data about network/user problem.

  • 3. Analyze data to come up with a possible solution to the problem.

  • 4. Implement solution to network to attempt correction to the system.

  • 5. If the problem isn't resolved, undo previous changes and modify data.

  • 6. Go to step 3


ad