SlideShare uma empresa Scribd logo
1 de 30
NETWORK
MANAGEMENT
VIDEO PRESENTATION
PRESENTED BY
KYAW ZIN LATT
SOE THIHA

SOE SANDAR SEIN WIN
NETWORK MAINTENANCE
Soe Sandar Sein Win [NETWORK CONSULTANT]
NetServed Pte Ltd.
NETWORK MAINTENANCE
•A solid network support such as Network Monitoring and
Network Maintenance are essential in order to maximize the
effectiveness and efficiency of the enterprise network
•Network maintenance is concerned with updates and repairs
and involves corrective measures for making managed network
for running better
Example: Network maintenance requires when a router needs a
patch for an operating system image or a new switch is added to
a network.
IMPORTANCE OF NETWORK MAINTENANCE

•Network Maintenance is mainly important as any problems within the network will
affect the organization as a whole and limits the success and progression of business
of the organization.
•One of the most important and relevant forms of maintenance involves the security
of the overall IT system.
•It includes backing up, checking the permissions in critical files, checking the
assignments of rights and monitoring system logs.
HOW IS IT USEFUL FOR NETWORK?
•Providing network availability and security

•Saving expenses for the network as it can minimize the
downtime of the network
•Planning the maintenance activities
•Implementing the maintenance activities planned and
those unforeseen

•Optimizing the network capability, reliability,
performance, consistency and longevity
Assumption
Network maintenance is very essential as the followings.
Need to have running up the network very smoothly for
our customers
Before users are affected, it can monitor the network spot

the problem very quickly
Repairs and upgrades are also concerning for network
maintenance
Assumption
Network maintenance is very essential as the followings.
A crucial component of keeping your network operational by
maintaining our network
By not having network maintenance, our company will

expand outward in every way
For additional maintenance, we also need requirements for
setup phase of our business

Downtime is rarely an acceptable for our network
Daily, Weekly, Monthly
Checklist
The components for the checklist are as follows:
•Workstations, desktops and Laptops
•Printers
•Switches
•Wireless Access Points
•Routers
•Servers
Quarterly Checklist for maintenance in
general
Some of the important checklists are as followings:
•Run performance monitor
•Check redundant array of independent disks (RAID), Processor
• Temperature, Event Logs, Antivirus, Backup Logs
•Check Physical Cabling and Network Connectivity Speed
•Perform Data Restoral Test
•Update System Boot Disk, IT Inventory, Documented
•Router/Switch Configuration, Network Diagram
•Check Router & Switch Firmware
NETWORK MONITORING
Soe Thiha [NETWORK CONSULTANT]
NetServed Pte Ltd.
GIVEN SCENARIO
NETWORK MONITORING
monitoring
For administration
Over active communication
network

For Fine Tuning

 To diagnose problems
 To gather statistics
NETWORK MONITORING SOFTWARES
(APPLICATIONS)
PRIVATE ADULT
TRAINING
Performance issue

Threats
ALERT

Reports

Health of Network Environment
OPENSOURCE VS. COMMERCIAL
SOFTWARES
Nagios
Zabbix
OPEN SOURCE
Cacti

COMMERCIAL
Free, trial version

NetCrunch
NETWORK MONITORING SOFTWARES
(APPLICATIONS)
GOALS OF NETWORK MONITORING

5 FUNCTIONAL AREAS SET BY OSI
PYRAMID SHAPE OF NETWORK
MONITORING

NETWORK
PROVISIONING
NETWORK
OPERATIONS
NETWORK
MAINTENANCE
TASKLIST

#

Tasklist

1

Fault Management

2

Configuration Management

3

Accounting Management

4

Performance Management

5

Security Management

6

Inventory Management

7

Account billing Management
NETWORK MONITORING PROTOCOLS

 SNMP
 NETCONF
 CMIP
 WBEM
 SYSLOG
 NetFlow
NETWORK MONITORING FLOWCHART
TRENDS IN NETWORK MONITORING

 BYOD
 Converged Networks (Cellular Networks
 Cloud Computing
NETWORK SECURITY
Kyaw Zin Latt [NETWORK CONSULTANT]
NetServed Pte Ltd.
NETWORK SECURITY

• Access Control
• Network Attacks
• Ensuring CIA (Confidentiality, Integrity and Availability)
• BYOD-related security issues
ACCESS CONTROL

• Operating System Access Controls
• Group and Roles
• Access Control List
NETWORK ATTACKS

• Eavesdropping
• Data Modification
• Identity Spoofing (IP Address Spoofing)

• Password-Based Attack
• Denial-of-Service Attack
• Man-in-the-Middle Attack
• Compromised-Key Attack

• Sniffer Attack
• Application-Layer Attack
DEFENSE AGAINST NETWORK ATTACK

• Configuration Management
• Firewalls
• Strengths and Limitations of Firewalls
• Encryption
ENSURING CIA
• Confidentiality
•

Encryption

• Integrity
•

Cryptography

• Availability
•

Backup
BYOD-RELATED SECURITY ISSUE

• Mobile device management and data protection
• Device and data loss
• Over or under working
• Lack of monitoring
SOLUTIONS

• Specify What Devices Are Permitted
• Establish a Stringent Security Policy for all Devices
• Define a Clear Service Policy for Devices Under BYOD Criteria.
• Make It Clear Who Owns What Apps and Data
• Decide What Apps Will Be Allowed or Banned
• Set Up an Employee Exit Strategy
THANK YOU

Mais conteúdo relacionado

Mais procurados

Dmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomDmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomPositive Hack Days
 
Network Management Fundamentals
Network Management FundamentalsNetwork Management Fundamentals
Network Management FundamentalsSolarWinds
 
New microsoft power point presentation (2)
New microsoft power point presentation (2)New microsoft power point presentation (2)
New microsoft power point presentation (2)Ramla Sheikh
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewChristine MacDonald
 
Carrier grade linux maintenance
Carrier grade linux maintenanceCarrier grade linux maintenance
Carrier grade linux maintenanceNagesh Kollu
 
ICS Performance Lab
ICS Performance LabICS Performance Lab
ICS Performance LabJim Gilsinn
 
Monitoring component in the FIWARE Lab
Monitoring component in the FIWARE LabMonitoring component in the FIWARE Lab
Monitoring component in the FIWARE LabFernando Lopez Aguilar
 
Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...ManageEngine, Zoho Corporation
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor PresentationNafaâ TAYACHI
 
Cogent Consutlting Case Study
Cogent Consutlting Case StudyCogent Consutlting Case Study
Cogent Consutlting Case StudyPower Admin LLC
 
24/7 network monitoring and after hours maintenance support service - Concor...
24/7 network monitoring and after hours maintenance support service  - Concor...24/7 network monitoring and after hours maintenance support service  - Concor...
24/7 network monitoring and after hours maintenance support service - Concor...concordantone
 
NOC Powerpoint dashboard
NOC Powerpoint dashboardNOC Powerpoint dashboard
NOC Powerpoint dashboardRonald Bartels
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point FirewallsBen Rothke
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsShah Sheikh
 
Stephan Gross Resume
Stephan Gross ResumeStephan Gross Resume
Stephan Gross ResumeStephan Gross
 
Chapter 8 Presentaion
Chapter 8 PresentaionChapter 8 Presentaion
Chapter 8 PresentaionAmy McMullin
 

Mais procurados (20)

TriFoldHandout
TriFoldHandoutTriFoldHandout
TriFoldHandout
 
Dmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomDmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a Telecom
 
Network Management Fundamentals
Network Management FundamentalsNetwork Management Fundamentals
Network Management Fundamentals
 
Virtual Firewall Management
Virtual Firewall ManagementVirtual Firewall Management
Virtual Firewall Management
 
New microsoft power point presentation (2)
New microsoft power point presentation (2)New microsoft power point presentation (2)
New microsoft power point presentation (2)
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration Review
 
Carrier grade linux maintenance
Carrier grade linux maintenanceCarrier grade linux maintenance
Carrier grade linux maintenance
 
ICS Performance Lab
ICS Performance LabICS Performance Lab
ICS Performance Lab
 
Monitoring component in the FIWARE Lab
Monitoring component in the FIWARE LabMonitoring component in the FIWARE Lab
Monitoring component in the FIWARE Lab
 
Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor Presentation
 
Chapter08
Chapter08Chapter08
Chapter08
 
Cogent Consutlting Case Study
Cogent Consutlting Case StudyCogent Consutlting Case Study
Cogent Consutlting Case Study
 
PCI Virtual Terminals - The Easy Way
PCI Virtual Terminals - The Easy WayPCI Virtual Terminals - The Easy Way
PCI Virtual Terminals - The Easy Way
 
24/7 network monitoring and after hours maintenance support service - Concor...
24/7 network monitoring and after hours maintenance support service  - Concor...24/7 network monitoring and after hours maintenance support service  - Concor...
24/7 network monitoring and after hours maintenance support service - Concor...
 
NOC Powerpoint dashboard
NOC Powerpoint dashboardNOC Powerpoint dashboard
NOC Powerpoint dashboard
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security Solutions
 
Stephan Gross Resume
Stephan Gross ResumeStephan Gross Resume
Stephan Gross Resume
 
Chapter 8 Presentaion
Chapter 8 PresentaionChapter 8 Presentaion
Chapter 8 Presentaion
 

Semelhante a Network Management

Supporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 ComplianceSupporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 ComplianceSolarWinds
 
DGI Compliance Webinar
DGI Compliance WebinarDGI Compliance Webinar
DGI Compliance WebinarSolarWinds
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11Waqas Ahmed Nawaz
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfThangDang53
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2Anne Starr
 
Maintenance of Hospital Information System
Maintenance of Hospital Information SystemMaintenance of Hospital Information System
Maintenance of Hospital Information SystemDr Jasbeer Singh
 
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWindsGovernment Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWindsSolarWinds
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentationArt Morrison
 
DDI_SN_NetwkOptimizationUpgrade
DDI_SN_NetwkOptimizationUpgradeDDI_SN_NetwkOptimizationUpgrade
DDI_SN_NetwkOptimizationUpgradeAbdRozaq Iwashokun
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentationArt Morrison
 
03FT_ManagedServicesBrochure_HRdigital
03FT_ManagedServicesBrochure_HRdigital03FT_ManagedServicesBrochure_HRdigital
03FT_ManagedServicesBrochure_HRdigitalMalcolm-John Bell
 
Microsoft Outage Analysis
Microsoft Outage AnalysisMicrosoft Outage Analysis
Microsoft Outage AnalysisThousandEyes
 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityPrecisely
 

Semelhante a Network Management (20)

Network management
Network managementNetwork management
Network management
 
Supporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 ComplianceSupporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 Compliance
 
DGI Compliance Webinar
DGI Compliance WebinarDGI Compliance Webinar
DGI Compliance Webinar
 
Chapter09
Chapter09Chapter09
Chapter09
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2
 
Maintenance of Hospital Information System
Maintenance of Hospital Information SystemMaintenance of Hospital Information System
Maintenance of Hospital Information System
 
Network Management.pdf
Network Management.pdfNetwork Management.pdf
Network Management.pdf
 
Resume
ResumeResume
Resume
 
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWindsGovernment Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
 
DDI_SN_NetwkOptimizationUpgrade
DDI_SN_NetwkOptimizationUpgradeDDI_SN_NetwkOptimizationUpgrade
DDI_SN_NetwkOptimizationUpgrade
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
 
Tripwire ppt
Tripwire pptTripwire ppt
Tripwire ppt
 
Sumanta CV
Sumanta CVSumanta CV
Sumanta CV
 
Ensuring your plant is secure
Ensuring your plant is secureEnsuring your plant is secure
Ensuring your plant is secure
 
03FT_ManagedServicesBrochure_HRdigital
03FT_ManagedServicesBrochure_HRdigital03FT_ManagedServicesBrochure_HRdigital
03FT_ManagedServicesBrochure_HRdigital
 
Microsoft Outage Analysis
Microsoft Outage AnalysisMicrosoft Outage Analysis
Microsoft Outage Analysis
 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and Security
 

Último

Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 

Último (20)

Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 

Network Management

  • 1. NETWORK MANAGEMENT VIDEO PRESENTATION PRESENTED BY KYAW ZIN LATT SOE THIHA SOE SANDAR SEIN WIN
  • 2. NETWORK MAINTENANCE Soe Sandar Sein Win [NETWORK CONSULTANT] NetServed Pte Ltd.
  • 3. NETWORK MAINTENANCE •A solid network support such as Network Monitoring and Network Maintenance are essential in order to maximize the effectiveness and efficiency of the enterprise network •Network maintenance is concerned with updates and repairs and involves corrective measures for making managed network for running better Example: Network maintenance requires when a router needs a patch for an operating system image or a new switch is added to a network.
  • 4. IMPORTANCE OF NETWORK MAINTENANCE •Network Maintenance is mainly important as any problems within the network will affect the organization as a whole and limits the success and progression of business of the organization. •One of the most important and relevant forms of maintenance involves the security of the overall IT system. •It includes backing up, checking the permissions in critical files, checking the assignments of rights and monitoring system logs.
  • 5. HOW IS IT USEFUL FOR NETWORK? •Providing network availability and security •Saving expenses for the network as it can minimize the downtime of the network •Planning the maintenance activities •Implementing the maintenance activities planned and those unforeseen •Optimizing the network capability, reliability, performance, consistency and longevity
  • 6. Assumption Network maintenance is very essential as the followings. Need to have running up the network very smoothly for our customers Before users are affected, it can monitor the network spot the problem very quickly Repairs and upgrades are also concerning for network maintenance
  • 7. Assumption Network maintenance is very essential as the followings. A crucial component of keeping your network operational by maintaining our network By not having network maintenance, our company will expand outward in every way For additional maintenance, we also need requirements for setup phase of our business Downtime is rarely an acceptable for our network
  • 8. Daily, Weekly, Monthly Checklist The components for the checklist are as follows: •Workstations, desktops and Laptops •Printers •Switches •Wireless Access Points •Routers •Servers
  • 9. Quarterly Checklist for maintenance in general Some of the important checklists are as followings: •Run performance monitor •Check redundant array of independent disks (RAID), Processor • Temperature, Event Logs, Antivirus, Backup Logs •Check Physical Cabling and Network Connectivity Speed •Perform Data Restoral Test •Update System Boot Disk, IT Inventory, Documented •Router/Switch Configuration, Network Diagram •Check Router & Switch Firmware
  • 10. NETWORK MONITORING Soe Thiha [NETWORK CONSULTANT] NetServed Pte Ltd.
  • 12. NETWORK MONITORING monitoring For administration Over active communication network For Fine Tuning  To diagnose problems  To gather statistics
  • 13. NETWORK MONITORING SOFTWARES (APPLICATIONS) PRIVATE ADULT TRAINING Performance issue Threats ALERT Reports Health of Network Environment
  • 14. OPENSOURCE VS. COMMERCIAL SOFTWARES Nagios Zabbix OPEN SOURCE Cacti COMMERCIAL Free, trial version NetCrunch
  • 16. GOALS OF NETWORK MONITORING 5 FUNCTIONAL AREAS SET BY OSI
  • 17. PYRAMID SHAPE OF NETWORK MONITORING NETWORK PROVISIONING NETWORK OPERATIONS NETWORK MAINTENANCE
  • 18. TASKLIST # Tasklist 1 Fault Management 2 Configuration Management 3 Accounting Management 4 Performance Management 5 Security Management 6 Inventory Management 7 Account billing Management
  • 19. NETWORK MONITORING PROTOCOLS  SNMP  NETCONF  CMIP  WBEM  SYSLOG  NetFlow
  • 21. TRENDS IN NETWORK MONITORING  BYOD  Converged Networks (Cellular Networks  Cloud Computing
  • 22. NETWORK SECURITY Kyaw Zin Latt [NETWORK CONSULTANT] NetServed Pte Ltd.
  • 23. NETWORK SECURITY • Access Control • Network Attacks • Ensuring CIA (Confidentiality, Integrity and Availability) • BYOD-related security issues
  • 24. ACCESS CONTROL • Operating System Access Controls • Group and Roles • Access Control List
  • 25. NETWORK ATTACKS • Eavesdropping • Data Modification • Identity Spoofing (IP Address Spoofing) • Password-Based Attack • Denial-of-Service Attack • Man-in-the-Middle Attack • Compromised-Key Attack • Sniffer Attack • Application-Layer Attack
  • 26. DEFENSE AGAINST NETWORK ATTACK • Configuration Management • Firewalls • Strengths and Limitations of Firewalls • Encryption
  • 27. ENSURING CIA • Confidentiality • Encryption • Integrity • Cryptography • Availability • Backup
  • 28. BYOD-RELATED SECURITY ISSUE • Mobile device management and data protection • Device and data loss • Over or under working • Lack of monitoring
  • 29. SOLUTIONS • Specify What Devices Are Permitted • Establish a Stringent Security Policy for all Devices • Define a Clear Service Policy for Devices Under BYOD Criteria. • Make It Clear Who Owns What Apps and Data • Decide What Apps Will Be Allowed or Banned • Set Up an Employee Exit Strategy