SlideShare a Scribd company logo
1 of 30
NETWORK
MANAGEMENT
VIDEO PRESENTATION
PRESENTED BY
KYAW ZIN LATT
SOE THIHA

SOE SANDAR SEIN WIN
NETWORK MAINTENANCE
Soe Sandar Sein Win [NETWORK CONSULTANT]
NetServed Pte Ltd.
NETWORK MAINTENANCE
•A solid network support such as Network Monitoring and
Network Maintenance are essential in order to maximize the
effectiveness and efficiency of the enterprise network
•Network maintenance is concerned with updates and repairs
and involves corrective measures for making managed network
for running better
Example: Network maintenance requires when a router needs a
patch for an operating system image or a new switch is added to
a network.
IMPORTANCE OF NETWORK MAINTENANCE

•Network Maintenance is mainly important as any problems within the network will
affect the organization as a whole and limits the success and progression of business
of the organization.
•One of the most important and relevant forms of maintenance involves the security
of the overall IT system.
•It includes backing up, checking the permissions in critical files, checking the
assignments of rights and monitoring system logs.
HOW IS IT USEFUL FOR NETWORK?
•Providing network availability and security

•Saving expenses for the network as it can minimize the
downtime of the network
•Planning the maintenance activities
•Implementing the maintenance activities planned and
those unforeseen

•Optimizing the network capability, reliability,
performance, consistency and longevity
Assumption
Network maintenance is very essential as the followings.
Need to have running up the network very smoothly for
our customers
Before users are affected, it can monitor the network spot

the problem very quickly
Repairs and upgrades are also concerning for network
maintenance
Assumption
Network maintenance is very essential as the followings.
A crucial component of keeping your network operational by
maintaining our network
By not having network maintenance, our company will

expand outward in every way
For additional maintenance, we also need requirements for
setup phase of our business

Downtime is rarely an acceptable for our network
Daily, Weekly, Monthly
Checklist
The components for the checklist are as follows:
•Workstations, desktops and Laptops
•Printers
•Switches
•Wireless Access Points
•Routers
•Servers
Quarterly Checklist for maintenance in
general
Some of the important checklists are as followings:
•Run performance monitor
•Check redundant array of independent disks (RAID), Processor
• Temperature, Event Logs, Antivirus, Backup Logs
•Check Physical Cabling and Network Connectivity Speed
•Perform Data Restoral Test
•Update System Boot Disk, IT Inventory, Documented
•Router/Switch Configuration, Network Diagram
•Check Router & Switch Firmware
NETWORK MONITORING
Soe Thiha [NETWORK CONSULTANT]
NetServed Pte Ltd.
GIVEN SCENARIO
NETWORK MONITORING
monitoring
For administration
Over active communication
network

For Fine Tuning

 To diagnose problems
 To gather statistics
NETWORK MONITORING SOFTWARES
(APPLICATIONS)
PRIVATE ADULT
TRAINING
Performance issue

Threats
ALERT

Reports

Health of Network Environment
OPENSOURCE VS. COMMERCIAL
SOFTWARES
Nagios
Zabbix
OPEN SOURCE
Cacti

COMMERCIAL
Free, trial version

NetCrunch
NETWORK MONITORING SOFTWARES
(APPLICATIONS)
GOALS OF NETWORK MONITORING

5 FUNCTIONAL AREAS SET BY OSI
PYRAMID SHAPE OF NETWORK
MONITORING

NETWORK
PROVISIONING
NETWORK
OPERATIONS
NETWORK
MAINTENANCE
TASKLIST

#

Tasklist

1

Fault Management

2

Configuration Management

3

Accounting Management

4

Performance Management

5

Security Management

6

Inventory Management

7

Account billing Management
NETWORK MONITORING PROTOCOLS

 SNMP
 NETCONF
 CMIP
 WBEM
 SYSLOG
 NetFlow
NETWORK MONITORING FLOWCHART
TRENDS IN NETWORK MONITORING

 BYOD
 Converged Networks (Cellular Networks
 Cloud Computing
NETWORK SECURITY
Kyaw Zin Latt [NETWORK CONSULTANT]
NetServed Pte Ltd.
NETWORK SECURITY

• Access Control
• Network Attacks
• Ensuring CIA (Confidentiality, Integrity and Availability)
• BYOD-related security issues
ACCESS CONTROL

• Operating System Access Controls
• Group and Roles
• Access Control List
NETWORK ATTACKS

• Eavesdropping
• Data Modification
• Identity Spoofing (IP Address Spoofing)

• Password-Based Attack
• Denial-of-Service Attack
• Man-in-the-Middle Attack
• Compromised-Key Attack

• Sniffer Attack
• Application-Layer Attack
DEFENSE AGAINST NETWORK ATTACK

• Configuration Management
• Firewalls
• Strengths and Limitations of Firewalls
• Encryption
ENSURING CIA
• Confidentiality
•

Encryption

• Integrity
•

Cryptography

• Availability
•

Backup
BYOD-RELATED SECURITY ISSUE

• Mobile device management and data protection
• Device and data loss
• Over or under working
• Lack of monitoring
SOLUTIONS

• Specify What Devices Are Permitted
• Establish a Stringent Security Policy for all Devices
• Define a Clear Service Policy for Devices Under BYOD Criteria.
• Make It Clear Who Owns What Apps and Data
• Decide What Apps Will Be Allowed or Banned
• Set Up an Employee Exit Strategy
THANK YOU

More Related Content

What's hot

Dmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomDmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a Telecom
Positive Hack Days
 
New microsoft power point presentation (2)
New microsoft power point presentation (2)New microsoft power point presentation (2)
New microsoft power point presentation (2)
Ramla Sheikh
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security Solutions
Shah Sheikh
 
Stephan Gross Resume
Stephan Gross ResumeStephan Gross Resume
Stephan Gross Resume
Stephan Gross
 

What's hot (20)

TriFoldHandout
TriFoldHandoutTriFoldHandout
TriFoldHandout
 
Dmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomDmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a Telecom
 
Network Management Fundamentals
Network Management FundamentalsNetwork Management Fundamentals
Network Management Fundamentals
 
Virtual Firewall Management
Virtual Firewall ManagementVirtual Firewall Management
Virtual Firewall Management
 
New microsoft power point presentation (2)
New microsoft power point presentation (2)New microsoft power point presentation (2)
New microsoft power point presentation (2)
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration Review
 
Carrier grade linux maintenance
Carrier grade linux maintenanceCarrier grade linux maintenance
Carrier grade linux maintenance
 
ICS Performance Lab
ICS Performance LabICS Performance Lab
ICS Performance Lab
 
Monitoring component in the FIWARE Lab
Monitoring component in the FIWARE LabMonitoring component in the FIWARE Lab
Monitoring component in the FIWARE Lab
 
Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor Presentation
 
Chapter08
Chapter08Chapter08
Chapter08
 
Cogent Consutlting Case Study
Cogent Consutlting Case StudyCogent Consutlting Case Study
Cogent Consutlting Case Study
 
PCI Virtual Terminals - The Easy Way
PCI Virtual Terminals - The Easy WayPCI Virtual Terminals - The Easy Way
PCI Virtual Terminals - The Easy Way
 
24/7 network monitoring and after hours maintenance support service - Concor...
24/7 network monitoring and after hours maintenance support service  - Concor...24/7 network monitoring and after hours maintenance support service  - Concor...
24/7 network monitoring and after hours maintenance support service - Concor...
 
NOC Powerpoint dashboard
NOC Powerpoint dashboardNOC Powerpoint dashboard
NOC Powerpoint dashboard
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security Solutions
 
Stephan Gross Resume
Stephan Gross ResumeStephan Gross Resume
Stephan Gross Resume
 
Chapter 8 Presentaion
Chapter 8 PresentaionChapter 8 Presentaion
Chapter 8 Presentaion
 

Similar to Network Management

gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2
Anne Starr
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
Art Morrison
 
DDI_SN_NetwkOptimizationUpgrade
DDI_SN_NetwkOptimizationUpgradeDDI_SN_NetwkOptimizationUpgrade
DDI_SN_NetwkOptimizationUpgrade
AbdRozaq Iwashokun
 
03FT_ManagedServicesBrochure_HRdigital
03FT_ManagedServicesBrochure_HRdigital03FT_ManagedServicesBrochure_HRdigital
03FT_ManagedServicesBrochure_HRdigital
Malcolm-John Bell
 

Similar to Network Management (20)

Network management
Network managementNetwork management
Network management
 
Supporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 ComplianceSupporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 Compliance
 
DGI Compliance Webinar
DGI Compliance WebinarDGI Compliance Webinar
DGI Compliance Webinar
 
Chapter09
Chapter09Chapter09
Chapter09
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2
 
Maintenance of Hospital Information System
Maintenance of Hospital Information SystemMaintenance of Hospital Information System
Maintenance of Hospital Information System
 
Network Management.pdf
Network Management.pdfNetwork Management.pdf
Network Management.pdf
 
Resume
ResumeResume
Resume
 
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWindsGovernment Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
 
DDI_SN_NetwkOptimizationUpgrade
DDI_SN_NetwkOptimizationUpgradeDDI_SN_NetwkOptimizationUpgrade
DDI_SN_NetwkOptimizationUpgrade
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
 
Tripwire ppt
Tripwire pptTripwire ppt
Tripwire ppt
 
Sumanta CV
Sumanta CVSumanta CV
Sumanta CV
 
Ensuring your plant is secure
Ensuring your plant is secureEnsuring your plant is secure
Ensuring your plant is secure
 
03FT_ManagedServicesBrochure_HRdigital
03FT_ManagedServicesBrochure_HRdigital03FT_ManagedServicesBrochure_HRdigital
03FT_ManagedServicesBrochure_HRdigital
 
Microsoft Outage Analysis
Microsoft Outage AnalysisMicrosoft Outage Analysis
Microsoft Outage Analysis
 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and Security
 

Recently uploaded

會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 

Recently uploaded (20)

Word Stress rules esl .pptx
Word Stress rules esl               .pptxWord Stress rules esl               .pptx
Word Stress rules esl .pptx
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. Henry
 
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
How to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 InventoryHow to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 Inventory
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
The Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxThe Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptx
 
HVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptx
HVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptxHVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptx
HVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptx
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
 
IPL Online Quiz by Pragya; Question Set.
IPL Online Quiz by Pragya; Question Set.IPL Online Quiz by Pragya; Question Set.
IPL Online Quiz by Pragya; Question Set.
 
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
 

Network Management

  • 1. NETWORK MANAGEMENT VIDEO PRESENTATION PRESENTED BY KYAW ZIN LATT SOE THIHA SOE SANDAR SEIN WIN
  • 2. NETWORK MAINTENANCE Soe Sandar Sein Win [NETWORK CONSULTANT] NetServed Pte Ltd.
  • 3. NETWORK MAINTENANCE •A solid network support such as Network Monitoring and Network Maintenance are essential in order to maximize the effectiveness and efficiency of the enterprise network •Network maintenance is concerned with updates and repairs and involves corrective measures for making managed network for running better Example: Network maintenance requires when a router needs a patch for an operating system image or a new switch is added to a network.
  • 4. IMPORTANCE OF NETWORK MAINTENANCE •Network Maintenance is mainly important as any problems within the network will affect the organization as a whole and limits the success and progression of business of the organization. •One of the most important and relevant forms of maintenance involves the security of the overall IT system. •It includes backing up, checking the permissions in critical files, checking the assignments of rights and monitoring system logs.
  • 5. HOW IS IT USEFUL FOR NETWORK? •Providing network availability and security •Saving expenses for the network as it can minimize the downtime of the network •Planning the maintenance activities •Implementing the maintenance activities planned and those unforeseen •Optimizing the network capability, reliability, performance, consistency and longevity
  • 6. Assumption Network maintenance is very essential as the followings. Need to have running up the network very smoothly for our customers Before users are affected, it can monitor the network spot the problem very quickly Repairs and upgrades are also concerning for network maintenance
  • 7. Assumption Network maintenance is very essential as the followings. A crucial component of keeping your network operational by maintaining our network By not having network maintenance, our company will expand outward in every way For additional maintenance, we also need requirements for setup phase of our business Downtime is rarely an acceptable for our network
  • 8. Daily, Weekly, Monthly Checklist The components for the checklist are as follows: •Workstations, desktops and Laptops •Printers •Switches •Wireless Access Points •Routers •Servers
  • 9. Quarterly Checklist for maintenance in general Some of the important checklists are as followings: •Run performance monitor •Check redundant array of independent disks (RAID), Processor • Temperature, Event Logs, Antivirus, Backup Logs •Check Physical Cabling and Network Connectivity Speed •Perform Data Restoral Test •Update System Boot Disk, IT Inventory, Documented •Router/Switch Configuration, Network Diagram •Check Router & Switch Firmware
  • 10. NETWORK MONITORING Soe Thiha [NETWORK CONSULTANT] NetServed Pte Ltd.
  • 12. NETWORK MONITORING monitoring For administration Over active communication network For Fine Tuning  To diagnose problems  To gather statistics
  • 13. NETWORK MONITORING SOFTWARES (APPLICATIONS) PRIVATE ADULT TRAINING Performance issue Threats ALERT Reports Health of Network Environment
  • 14. OPENSOURCE VS. COMMERCIAL SOFTWARES Nagios Zabbix OPEN SOURCE Cacti COMMERCIAL Free, trial version NetCrunch
  • 16. GOALS OF NETWORK MONITORING 5 FUNCTIONAL AREAS SET BY OSI
  • 17. PYRAMID SHAPE OF NETWORK MONITORING NETWORK PROVISIONING NETWORK OPERATIONS NETWORK MAINTENANCE
  • 18. TASKLIST # Tasklist 1 Fault Management 2 Configuration Management 3 Accounting Management 4 Performance Management 5 Security Management 6 Inventory Management 7 Account billing Management
  • 19. NETWORK MONITORING PROTOCOLS  SNMP  NETCONF  CMIP  WBEM  SYSLOG  NetFlow
  • 21. TRENDS IN NETWORK MONITORING  BYOD  Converged Networks (Cellular Networks  Cloud Computing
  • 22. NETWORK SECURITY Kyaw Zin Latt [NETWORK CONSULTANT] NetServed Pte Ltd.
  • 23. NETWORK SECURITY • Access Control • Network Attacks • Ensuring CIA (Confidentiality, Integrity and Availability) • BYOD-related security issues
  • 24. ACCESS CONTROL • Operating System Access Controls • Group and Roles • Access Control List
  • 25. NETWORK ATTACKS • Eavesdropping • Data Modification • Identity Spoofing (IP Address Spoofing) • Password-Based Attack • Denial-of-Service Attack • Man-in-the-Middle Attack • Compromised-Key Attack • Sniffer Attack • Application-Layer Attack
  • 26. DEFENSE AGAINST NETWORK ATTACK • Configuration Management • Firewalls • Strengths and Limitations of Firewalls • Encryption
  • 27. ENSURING CIA • Confidentiality • Encryption • Integrity • Cryptography • Availability • Backup
  • 28. BYOD-RELATED SECURITY ISSUE • Mobile device management and data protection • Device and data loss • Over or under working • Lack of monitoring
  • 29. SOLUTIONS • Specify What Devices Are Permitted • Establish a Stringent Security Policy for all Devices • Define a Clear Service Policy for Devices Under BYOD Criteria. • Make It Clear Who Owns What Apps and Data • Decide What Apps Will Be Allowed or Banned • Set Up an Employee Exit Strategy