SlideShare una empresa de Scribd logo
1 de 30
NETWORK
MANAGEMENT
VIDEO PRESENTATION
PRESENTED BY
KYAW ZIN LATT
SOE THIHA

SOE SANDAR SEIN WIN
NETWORK MAINTENANCE
Soe Sandar Sein Win [NETWORK CONSULTANT]
NetServed Pte Ltd.
NETWORK MAINTENANCE
•A solid network support such as Network Monitoring and
Network Maintenance are essential in order to maximize the
effectiveness and efficiency of the enterprise network
•Network maintenance is concerned with updates and repairs
and involves corrective measures for making managed network
for running better
Example: Network maintenance requires when a router needs a
patch for an operating system image or a new switch is added to
a network.
IMPORTANCE OF NETWORK MAINTENANCE

•Network Maintenance is mainly important as any problems within the network will
affect the organization as a whole and limits the success and progression of business
of the organization.
•One of the most important and relevant forms of maintenance involves the security
of the overall IT system.
•It includes backing up, checking the permissions in critical files, checking the
assignments of rights and monitoring system logs.
HOW IS IT USEFUL FOR NETWORK?
•Providing network availability and security

•Saving expenses for the network as it can minimize the
downtime of the network
•Planning the maintenance activities
•Implementing the maintenance activities planned and
those unforeseen

•Optimizing the network capability, reliability,
performance, consistency and longevity
Assumption
Network maintenance is very essential as the followings.
Need to have running up the network very smoothly for
our customers
Before users are affected, it can monitor the network spot

the problem very quickly
Repairs and upgrades are also concerning for network
maintenance
Assumption
Network maintenance is very essential as the followings.
A crucial component of keeping your network operational by
maintaining our network
By not having network maintenance, our company will

expand outward in every way
For additional maintenance, we also need requirements for
setup phase of our business

Downtime is rarely an acceptable for our network
Daily, Weekly, Monthly
Checklist
The components for the checklist are as follows:
•Workstations, desktops and Laptops
•Printers
•Switches
•Wireless Access Points
•Routers
•Servers
Quarterly Checklist for maintenance in
general
Some of the important checklists are as followings:
•Run performance monitor
•Check redundant array of independent disks (RAID), Processor
• Temperature, Event Logs, Antivirus, Backup Logs
•Check Physical Cabling and Network Connectivity Speed
•Perform Data Restoral Test
•Update System Boot Disk, IT Inventory, Documented
•Router/Switch Configuration, Network Diagram
•Check Router & Switch Firmware
NETWORK MONITORING
Soe Thiha [NETWORK CONSULTANT]
NetServed Pte Ltd.
GIVEN SCENARIO
NETWORK MONITORING
monitoring
For administration
Over active communication
network

For Fine Tuning

 To diagnose problems
 To gather statistics
NETWORK MONITORING SOFTWARES
(APPLICATIONS)
PRIVATE ADULT
TRAINING
Performance issue

Threats
ALERT

Reports

Health of Network Environment
OPENSOURCE VS. COMMERCIAL
SOFTWARES
Nagios
Zabbix
OPEN SOURCE
Cacti

COMMERCIAL
Free, trial version

NetCrunch
NETWORK MONITORING SOFTWARES
(APPLICATIONS)
GOALS OF NETWORK MONITORING

5 FUNCTIONAL AREAS SET BY OSI
PYRAMID SHAPE OF NETWORK
MONITORING

NETWORK
PROVISIONING
NETWORK
OPERATIONS
NETWORK
MAINTENANCE
TASKLIST

#

Tasklist

1

Fault Management

2

Configuration Management

3

Accounting Management

4

Performance Management

5

Security Management

6

Inventory Management

7

Account billing Management
NETWORK MONITORING PROTOCOLS

 SNMP
 NETCONF
 CMIP
 WBEM
 SYSLOG
 NetFlow
NETWORK MONITORING FLOWCHART
TRENDS IN NETWORK MONITORING

 BYOD
 Converged Networks (Cellular Networks
 Cloud Computing
NETWORK SECURITY
Kyaw Zin Latt [NETWORK CONSULTANT]
NetServed Pte Ltd.
NETWORK SECURITY

• Access Control
• Network Attacks
• Ensuring CIA (Confidentiality, Integrity and Availability)
• BYOD-related security issues
ACCESS CONTROL

• Operating System Access Controls
• Group and Roles
• Access Control List
NETWORK ATTACKS

• Eavesdropping
• Data Modification
• Identity Spoofing (IP Address Spoofing)

• Password-Based Attack
• Denial-of-Service Attack
• Man-in-the-Middle Attack
• Compromised-Key Attack

• Sniffer Attack
• Application-Layer Attack
DEFENSE AGAINST NETWORK ATTACK

• Configuration Management
• Firewalls
• Strengths and Limitations of Firewalls
• Encryption
ENSURING CIA
• Confidentiality
•

Encryption

• Integrity
•

Cryptography

• Availability
•

Backup
BYOD-RELATED SECURITY ISSUE

• Mobile device management and data protection
• Device and data loss
• Over or under working
• Lack of monitoring
SOLUTIONS

• Specify What Devices Are Permitted
• Establish a Stringent Security Policy for all Devices
• Define a Clear Service Policy for Devices Under BYOD Criteria.
• Make It Clear Who Owns What Apps and Data
• Decide What Apps Will Be Allowed or Banned
• Set Up an Employee Exit Strategy
THANK YOU

Más contenido relacionado

La actualidad más candente

Dmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomDmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomPositive Hack Days
 
Network Management Fundamentals
Network Management FundamentalsNetwork Management Fundamentals
Network Management FundamentalsSolarWinds
 
New microsoft power point presentation (2)
New microsoft power point presentation (2)New microsoft power point presentation (2)
New microsoft power point presentation (2)Ramla Sheikh
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewChristine MacDonald
 
Carrier grade linux maintenance
Carrier grade linux maintenanceCarrier grade linux maintenance
Carrier grade linux maintenanceNagesh Kollu
 
ICS Performance Lab
ICS Performance LabICS Performance Lab
ICS Performance LabJim Gilsinn
 
Monitoring component in the FIWARE Lab
Monitoring component in the FIWARE LabMonitoring component in the FIWARE Lab
Monitoring component in the FIWARE LabFernando Lopez Aguilar
 
Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...ManageEngine, Zoho Corporation
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor PresentationNafaâ TAYACHI
 
Cogent Consutlting Case Study
Cogent Consutlting Case StudyCogent Consutlting Case Study
Cogent Consutlting Case StudyPower Admin LLC
 
24/7 network monitoring and after hours maintenance support service - Concor...
24/7 network monitoring and after hours maintenance support service  - Concor...24/7 network monitoring and after hours maintenance support service  - Concor...
24/7 network monitoring and after hours maintenance support service - Concor...concordantone
 
NOC Powerpoint dashboard
NOC Powerpoint dashboardNOC Powerpoint dashboard
NOC Powerpoint dashboardRonald Bartels
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point FirewallsBen Rothke
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsShah Sheikh
 
Stephan Gross Resume
Stephan Gross ResumeStephan Gross Resume
Stephan Gross ResumeStephan Gross
 
Chapter 8 Presentaion
Chapter 8 PresentaionChapter 8 Presentaion
Chapter 8 PresentaionAmy McMullin
 

La actualidad más candente (20)

TriFoldHandout
TriFoldHandoutTriFoldHandout
TriFoldHandout
 
Dmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomDmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a Telecom
 
Network Management Fundamentals
Network Management FundamentalsNetwork Management Fundamentals
Network Management Fundamentals
 
Virtual Firewall Management
Virtual Firewall ManagementVirtual Firewall Management
Virtual Firewall Management
 
New microsoft power point presentation (2)
New microsoft power point presentation (2)New microsoft power point presentation (2)
New microsoft power point presentation (2)
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration Review
 
Carrier grade linux maintenance
Carrier grade linux maintenanceCarrier grade linux maintenance
Carrier grade linux maintenance
 
ICS Performance Lab
ICS Performance LabICS Performance Lab
ICS Performance Lab
 
Monitoring component in the FIWARE Lab
Monitoring component in the FIWARE LabMonitoring component in the FIWARE Lab
Monitoring component in the FIWARE Lab
 
Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor Presentation
 
Chapter08
Chapter08Chapter08
Chapter08
 
Cogent Consutlting Case Study
Cogent Consutlting Case StudyCogent Consutlting Case Study
Cogent Consutlting Case Study
 
PCI Virtual Terminals - The Easy Way
PCI Virtual Terminals - The Easy WayPCI Virtual Terminals - The Easy Way
PCI Virtual Terminals - The Easy Way
 
24/7 network monitoring and after hours maintenance support service - Concor...
24/7 network monitoring and after hours maintenance support service  - Concor...24/7 network monitoring and after hours maintenance support service  - Concor...
24/7 network monitoring and after hours maintenance support service - Concor...
 
NOC Powerpoint dashboard
NOC Powerpoint dashboardNOC Powerpoint dashboard
NOC Powerpoint dashboard
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security Solutions
 
Stephan Gross Resume
Stephan Gross ResumeStephan Gross Resume
Stephan Gross Resume
 
Chapter 8 Presentaion
Chapter 8 PresentaionChapter 8 Presentaion
Chapter 8 Presentaion
 

Similar a Network Management

Supporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 ComplianceSupporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 ComplianceSolarWinds
 
DGI Compliance Webinar
DGI Compliance WebinarDGI Compliance Webinar
DGI Compliance WebinarSolarWinds
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11Waqas Ahmed Nawaz
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfThangDang53
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2Anne Starr
 
Maintenance of Hospital Information System
Maintenance of Hospital Information SystemMaintenance of Hospital Information System
Maintenance of Hospital Information SystemDr Jasbeer Singh
 
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWindsGovernment Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWindsSolarWinds
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentationArt Morrison
 
DDI_SN_NetwkOptimizationUpgrade
DDI_SN_NetwkOptimizationUpgradeDDI_SN_NetwkOptimizationUpgrade
DDI_SN_NetwkOptimizationUpgradeAbdRozaq Iwashokun
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentationArt Morrison
 
03FT_ManagedServicesBrochure_HRdigital
03FT_ManagedServicesBrochure_HRdigital03FT_ManagedServicesBrochure_HRdigital
03FT_ManagedServicesBrochure_HRdigitalMalcolm-John Bell
 
Microsoft Outage Analysis
Microsoft Outage AnalysisMicrosoft Outage Analysis
Microsoft Outage AnalysisThousandEyes
 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityPrecisely
 

Similar a Network Management (20)

Network management
Network managementNetwork management
Network management
 
Supporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 ComplianceSupporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 Compliance
 
DGI Compliance Webinar
DGI Compliance WebinarDGI Compliance Webinar
DGI Compliance Webinar
 
Chapter09
Chapter09Chapter09
Chapter09
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2
 
Maintenance of Hospital Information System
Maintenance of Hospital Information SystemMaintenance of Hospital Information System
Maintenance of Hospital Information System
 
Network Management.pdf
Network Management.pdfNetwork Management.pdf
Network Management.pdf
 
Resume
ResumeResume
Resume
 
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWindsGovernment Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
 
DDI_SN_NetwkOptimizationUpgrade
DDI_SN_NetwkOptimizationUpgradeDDI_SN_NetwkOptimizationUpgrade
DDI_SN_NetwkOptimizationUpgrade
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
 
Tripwire ppt
Tripwire pptTripwire ppt
Tripwire ppt
 
Sumanta CV
Sumanta CVSumanta CV
Sumanta CV
 
Ensuring your plant is secure
Ensuring your plant is secureEnsuring your plant is secure
Ensuring your plant is secure
 
03FT_ManagedServicesBrochure_HRdigital
03FT_ManagedServicesBrochure_HRdigital03FT_ManagedServicesBrochure_HRdigital
03FT_ManagedServicesBrochure_HRdigital
 
Microsoft Outage Analysis
Microsoft Outage AnalysisMicrosoft Outage Analysis
Microsoft Outage Analysis
 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and Security
 

Último

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 

Último (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 

Network Management

  • 1. NETWORK MANAGEMENT VIDEO PRESENTATION PRESENTED BY KYAW ZIN LATT SOE THIHA SOE SANDAR SEIN WIN
  • 2. NETWORK MAINTENANCE Soe Sandar Sein Win [NETWORK CONSULTANT] NetServed Pte Ltd.
  • 3. NETWORK MAINTENANCE •A solid network support such as Network Monitoring and Network Maintenance are essential in order to maximize the effectiveness and efficiency of the enterprise network •Network maintenance is concerned with updates and repairs and involves corrective measures for making managed network for running better Example: Network maintenance requires when a router needs a patch for an operating system image or a new switch is added to a network.
  • 4. IMPORTANCE OF NETWORK MAINTENANCE •Network Maintenance is mainly important as any problems within the network will affect the organization as a whole and limits the success and progression of business of the organization. •One of the most important and relevant forms of maintenance involves the security of the overall IT system. •It includes backing up, checking the permissions in critical files, checking the assignments of rights and monitoring system logs.
  • 5. HOW IS IT USEFUL FOR NETWORK? •Providing network availability and security •Saving expenses for the network as it can minimize the downtime of the network •Planning the maintenance activities •Implementing the maintenance activities planned and those unforeseen •Optimizing the network capability, reliability, performance, consistency and longevity
  • 6. Assumption Network maintenance is very essential as the followings. Need to have running up the network very smoothly for our customers Before users are affected, it can monitor the network spot the problem very quickly Repairs and upgrades are also concerning for network maintenance
  • 7. Assumption Network maintenance is very essential as the followings. A crucial component of keeping your network operational by maintaining our network By not having network maintenance, our company will expand outward in every way For additional maintenance, we also need requirements for setup phase of our business Downtime is rarely an acceptable for our network
  • 8. Daily, Weekly, Monthly Checklist The components for the checklist are as follows: •Workstations, desktops and Laptops •Printers •Switches •Wireless Access Points •Routers •Servers
  • 9. Quarterly Checklist for maintenance in general Some of the important checklists are as followings: •Run performance monitor •Check redundant array of independent disks (RAID), Processor • Temperature, Event Logs, Antivirus, Backup Logs •Check Physical Cabling and Network Connectivity Speed •Perform Data Restoral Test •Update System Boot Disk, IT Inventory, Documented •Router/Switch Configuration, Network Diagram •Check Router & Switch Firmware
  • 10. NETWORK MONITORING Soe Thiha [NETWORK CONSULTANT] NetServed Pte Ltd.
  • 12. NETWORK MONITORING monitoring For administration Over active communication network For Fine Tuning  To diagnose problems  To gather statistics
  • 13. NETWORK MONITORING SOFTWARES (APPLICATIONS) PRIVATE ADULT TRAINING Performance issue Threats ALERT Reports Health of Network Environment
  • 14. OPENSOURCE VS. COMMERCIAL SOFTWARES Nagios Zabbix OPEN SOURCE Cacti COMMERCIAL Free, trial version NetCrunch
  • 16. GOALS OF NETWORK MONITORING 5 FUNCTIONAL AREAS SET BY OSI
  • 17. PYRAMID SHAPE OF NETWORK MONITORING NETWORK PROVISIONING NETWORK OPERATIONS NETWORK MAINTENANCE
  • 18. TASKLIST # Tasklist 1 Fault Management 2 Configuration Management 3 Accounting Management 4 Performance Management 5 Security Management 6 Inventory Management 7 Account billing Management
  • 19. NETWORK MONITORING PROTOCOLS  SNMP  NETCONF  CMIP  WBEM  SYSLOG  NetFlow
  • 21. TRENDS IN NETWORK MONITORING  BYOD  Converged Networks (Cellular Networks  Cloud Computing
  • 22. NETWORK SECURITY Kyaw Zin Latt [NETWORK CONSULTANT] NetServed Pte Ltd.
  • 23. NETWORK SECURITY • Access Control • Network Attacks • Ensuring CIA (Confidentiality, Integrity and Availability) • BYOD-related security issues
  • 24. ACCESS CONTROL • Operating System Access Controls • Group and Roles • Access Control List
  • 25. NETWORK ATTACKS • Eavesdropping • Data Modification • Identity Spoofing (IP Address Spoofing) • Password-Based Attack • Denial-of-Service Attack • Man-in-the-Middle Attack • Compromised-Key Attack • Sniffer Attack • Application-Layer Attack
  • 26. DEFENSE AGAINST NETWORK ATTACK • Configuration Management • Firewalls • Strengths and Limitations of Firewalls • Encryption
  • 27. ENSURING CIA • Confidentiality • Encryption • Integrity • Cryptography • Availability • Backup
  • 28. BYOD-RELATED SECURITY ISSUE • Mobile device management and data protection • Device and data loss • Over or under working • Lack of monitoring
  • 29. SOLUTIONS • Specify What Devices Are Permitted • Establish a Stringent Security Policy for all Devices • Define a Clear Service Policy for Devices Under BYOD Criteria. • Make It Clear Who Owns What Apps and Data • Decide What Apps Will Be Allowed or Banned • Set Up an Employee Exit Strategy