SlideShare a Scribd company logo
1 of 30
NETWORK
MANAGEMENT
VIDEO PRESENTATION
PRESENTED BY
KYAW ZIN LATT
SOE THIHA

SOE SANDAR SEIN WIN
NETWORK MAINTENANCE
Soe Sandar Sein Win [NETWORK CONSULTANT]
NetServed Pte Ltd.
NETWORK MAINTENANCE
•A solid network support such as Network Monitoring and
Network Maintenance are essential in order to maximize the
effectiveness and efficiency of the enterprise network
•Network maintenance is concerned with updates and repairs
and involves corrective measures for making managed network
for running better
Example: Network maintenance requires when a router needs a
patch for an operating system image or a new switch is added to
a network.
IMPORTANCE OF NETWORK MAINTENANCE

•Network Maintenance is mainly important as any problems within the network will
affect the organization as a whole and limits the success and progression of business
of the organization.
•One of the most important and relevant forms of maintenance involves the security
of the overall IT system.
•It includes backing up, checking the permissions in critical files, checking the
assignments of rights and monitoring system logs.
HOW IS IT USEFUL FOR NETWORK?
•Providing network availability and security

•Saving expenses for the network as it can minimize the
downtime of the network
•Planning the maintenance activities
•Implementing the maintenance activities planned and
those unforeseen

•Optimizing the network capability, reliability,
performance, consistency and longevity
Assumption
Network maintenance is very essential as the followings.
Need to have running up the network very smoothly for
our customers
Before users are affected, it can monitor the network spot

the problem very quickly
Repairs and upgrades are also concerning for network
maintenance
Assumption
Network maintenance is very essential as the followings.
A crucial component of keeping your network operational by
maintaining our network
By not having network maintenance, our company will

expand outward in every way
For additional maintenance, we also need requirements for
setup phase of our business

Downtime is rarely an acceptable for our network
Daily, Weekly, Monthly
Checklist
The components for the checklist are as follows:
•Workstations, desktops and Laptops
•Printers
•Switches
•Wireless Access Points
•Routers
•Servers
Quarterly Checklist for maintenance in
general
Some of the important checklists are as followings:
•Run performance monitor
•Check redundant array of independent disks (RAID), Processor
• Temperature, Event Logs, Antivirus, Backup Logs
•Check Physical Cabling and Network Connectivity Speed
•Perform Data Restoral Test
•Update System Boot Disk, IT Inventory, Documented
•Router/Switch Configuration, Network Diagram
•Check Router & Switch Firmware
NETWORK MONITORING
Soe Thiha [NETWORK CONSULTANT]
NetServed Pte Ltd.
GIVEN SCENARIO
NETWORK MONITORING
monitoring
For administration
Over active communication
network

For Fine Tuning

 To diagnose problems
 To gather statistics
NETWORK MONITORING SOFTWARES
(APPLICATIONS)
PRIVATE ADULT
TRAINING
Performance issue

Threats
ALERT

Reports

Health of Network Environment
OPENSOURCE VS. COMMERCIAL
SOFTWARES
Nagios
Zabbix
OPEN SOURCE
Cacti

COMMERCIAL
Free, trial version

NetCrunch
NETWORK MONITORING SOFTWARES
(APPLICATIONS)
GOALS OF NETWORK MONITORING

5 FUNCTIONAL AREAS SET BY OSI
PYRAMID SHAPE OF NETWORK
MONITORING

NETWORK
PROVISIONING
NETWORK
OPERATIONS
NETWORK
MAINTENANCE
TASKLIST

#

Tasklist

1

Fault Management

2

Configuration Management

3

Accounting Management

4

Performance Management

5

Security Management

6

Inventory Management

7

Account billing Management
NETWORK MONITORING PROTOCOLS

 SNMP
 NETCONF
 CMIP
 WBEM
 SYSLOG
 NetFlow
NETWORK MONITORING FLOWCHART
TRENDS IN NETWORK MONITORING

 BYOD
 Converged Networks (Cellular Networks
 Cloud Computing
NETWORK SECURITY
Kyaw Zin Latt [NETWORK CONSULTANT]
NetServed Pte Ltd.
NETWORK SECURITY

• Access Control
• Network Attacks
• Ensuring CIA (Confidentiality, Integrity and Availability)
• BYOD-related security issues
ACCESS CONTROL

• Operating System Access Controls
• Group and Roles
• Access Control List
NETWORK ATTACKS

• Eavesdropping
• Data Modification
• Identity Spoofing (IP Address Spoofing)

• Password-Based Attack
• Denial-of-Service Attack
• Man-in-the-Middle Attack
• Compromised-Key Attack

• Sniffer Attack
• Application-Layer Attack
DEFENSE AGAINST NETWORK ATTACK

• Configuration Management
• Firewalls
• Strengths and Limitations of Firewalls
• Encryption
ENSURING CIA
• Confidentiality
•

Encryption

• Integrity
•

Cryptography

• Availability
•

Backup
BYOD-RELATED SECURITY ISSUE

• Mobile device management and data protection
• Device and data loss
• Over or under working
• Lack of monitoring
SOLUTIONS

• Specify What Devices Are Permitted
• Establish a Stringent Security Policy for all Devices
• Define a Clear Service Policy for Devices Under BYOD Criteria.
• Make It Clear Who Owns What Apps and Data
• Decide What Apps Will Be Allowed or Banned
• Set Up an Employee Exit Strategy
THANK YOU

More Related Content

What's hot

Dmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomDmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomPositive Hack Days
 
Network Management Fundamentals
Network Management FundamentalsNetwork Management Fundamentals
Network Management FundamentalsSolarWinds
 
New microsoft power point presentation (2)
New microsoft power point presentation (2)New microsoft power point presentation (2)
New microsoft power point presentation (2)Ramla Sheikh
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewChristine MacDonald
 
Carrier grade linux maintenance
Carrier grade linux maintenanceCarrier grade linux maintenance
Carrier grade linux maintenanceNagesh Kollu
 
ICS Performance Lab
ICS Performance LabICS Performance Lab
ICS Performance LabJim Gilsinn
 
Monitoring component in the FIWARE Lab
Monitoring component in the FIWARE LabMonitoring component in the FIWARE Lab
Monitoring component in the FIWARE LabFernando Lopez Aguilar
 
Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...ManageEngine, Zoho Corporation
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor PresentationNafaâ TAYACHI
 
Cogent Consutlting Case Study
Cogent Consutlting Case StudyCogent Consutlting Case Study
Cogent Consutlting Case StudyPower Admin LLC
 
24/7 network monitoring and after hours maintenance support service - Concor...
24/7 network monitoring and after hours maintenance support service  - Concor...24/7 network monitoring and after hours maintenance support service  - Concor...
24/7 network monitoring and after hours maintenance support service - Concor...concordantone
 
NOC Powerpoint dashboard
NOC Powerpoint dashboardNOC Powerpoint dashboard
NOC Powerpoint dashboardRonald Bartels
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point FirewallsBen Rothke
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsShah Sheikh
 
Stephan Gross Resume
Stephan Gross ResumeStephan Gross Resume
Stephan Gross ResumeStephan Gross
 
Chapter 8 Presentaion
Chapter 8 PresentaionChapter 8 Presentaion
Chapter 8 PresentaionAmy McMullin
 

What's hot (20)

TriFoldHandout
TriFoldHandoutTriFoldHandout
TriFoldHandout
 
Dmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomDmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a Telecom
 
Network Management Fundamentals
Network Management FundamentalsNetwork Management Fundamentals
Network Management Fundamentals
 
Virtual Firewall Management
Virtual Firewall ManagementVirtual Firewall Management
Virtual Firewall Management
 
New microsoft power point presentation (2)
New microsoft power point presentation (2)New microsoft power point presentation (2)
New microsoft power point presentation (2)
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration Review
 
Carrier grade linux maintenance
Carrier grade linux maintenanceCarrier grade linux maintenance
Carrier grade linux maintenance
 
ICS Performance Lab
ICS Performance LabICS Performance Lab
ICS Performance Lab
 
Monitoring component in the FIWARE Lab
Monitoring component in the FIWARE LabMonitoring component in the FIWARE Lab
Monitoring component in the FIWARE Lab
 
Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor Presentation
 
Chapter08
Chapter08Chapter08
Chapter08
 
Cogent Consutlting Case Study
Cogent Consutlting Case StudyCogent Consutlting Case Study
Cogent Consutlting Case Study
 
PCI Virtual Terminals - The Easy Way
PCI Virtual Terminals - The Easy WayPCI Virtual Terminals - The Easy Way
PCI Virtual Terminals - The Easy Way
 
24/7 network monitoring and after hours maintenance support service - Concor...
24/7 network monitoring and after hours maintenance support service  - Concor...24/7 network monitoring and after hours maintenance support service  - Concor...
24/7 network monitoring and after hours maintenance support service - Concor...
 
NOC Powerpoint dashboard
NOC Powerpoint dashboardNOC Powerpoint dashboard
NOC Powerpoint dashboard
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security Solutions
 
Stephan Gross Resume
Stephan Gross ResumeStephan Gross Resume
Stephan Gross Resume
 
Chapter 8 Presentaion
Chapter 8 PresentaionChapter 8 Presentaion
Chapter 8 Presentaion
 

Similar to Network Management

Supporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 ComplianceSupporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 ComplianceSolarWinds
 
DGI Compliance Webinar
DGI Compliance WebinarDGI Compliance Webinar
DGI Compliance WebinarSolarWinds
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11Waqas Ahmed Nawaz
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfThangDang53
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2Anne Starr
 
Maintenance of Hospital Information System
Maintenance of Hospital Information SystemMaintenance of Hospital Information System
Maintenance of Hospital Information SystemDr Jasbeer Singh
 
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWindsGovernment Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWindsSolarWinds
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentationArt Morrison
 
DDI_SN_NetwkOptimizationUpgrade
DDI_SN_NetwkOptimizationUpgradeDDI_SN_NetwkOptimizationUpgrade
DDI_SN_NetwkOptimizationUpgradeAbdRozaq Iwashokun
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentationArt Morrison
 
03FT_ManagedServicesBrochure_HRdigital
03FT_ManagedServicesBrochure_HRdigital03FT_ManagedServicesBrochure_HRdigital
03FT_ManagedServicesBrochure_HRdigitalMalcolm-John Bell
 
Microsoft Outage Analysis
Microsoft Outage AnalysisMicrosoft Outage Analysis
Microsoft Outage AnalysisThousandEyes
 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityPrecisely
 

Similar to Network Management (20)

Network management
Network managementNetwork management
Network management
 
Supporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 ComplianceSupporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 Compliance
 
DGI Compliance Webinar
DGI Compliance WebinarDGI Compliance Webinar
DGI Compliance Webinar
 
Chapter09
Chapter09Chapter09
Chapter09
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2
 
Maintenance of Hospital Information System
Maintenance of Hospital Information SystemMaintenance of Hospital Information System
Maintenance of Hospital Information System
 
Network Management.pdf
Network Management.pdfNetwork Management.pdf
Network Management.pdf
 
Resume
ResumeResume
Resume
 
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWindsGovernment Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
 
DDI_SN_NetwkOptimizationUpgrade
DDI_SN_NetwkOptimizationUpgradeDDI_SN_NetwkOptimizationUpgrade
DDI_SN_NetwkOptimizationUpgrade
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
 
Tripwire ppt
Tripwire pptTripwire ppt
Tripwire ppt
 
Sumanta CV
Sumanta CVSumanta CV
Sumanta CV
 
Ensuring your plant is secure
Ensuring your plant is secureEnsuring your plant is secure
Ensuring your plant is secure
 
03FT_ManagedServicesBrochure_HRdigital
03FT_ManagedServicesBrochure_HRdigital03FT_ManagedServicesBrochure_HRdigital
03FT_ManagedServicesBrochure_HRdigital
 
Microsoft Outage Analysis
Microsoft Outage AnalysisMicrosoft Outage Analysis
Microsoft Outage Analysis
 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and Security
 

Recently uploaded

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 

Recently uploaded (20)

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 

Network Management

  • 1. NETWORK MANAGEMENT VIDEO PRESENTATION PRESENTED BY KYAW ZIN LATT SOE THIHA SOE SANDAR SEIN WIN
  • 2. NETWORK MAINTENANCE Soe Sandar Sein Win [NETWORK CONSULTANT] NetServed Pte Ltd.
  • 3. NETWORK MAINTENANCE •A solid network support such as Network Monitoring and Network Maintenance are essential in order to maximize the effectiveness and efficiency of the enterprise network •Network maintenance is concerned with updates and repairs and involves corrective measures for making managed network for running better Example: Network maintenance requires when a router needs a patch for an operating system image or a new switch is added to a network.
  • 4. IMPORTANCE OF NETWORK MAINTENANCE •Network Maintenance is mainly important as any problems within the network will affect the organization as a whole and limits the success and progression of business of the organization. •One of the most important and relevant forms of maintenance involves the security of the overall IT system. •It includes backing up, checking the permissions in critical files, checking the assignments of rights and monitoring system logs.
  • 5. HOW IS IT USEFUL FOR NETWORK? •Providing network availability and security •Saving expenses for the network as it can minimize the downtime of the network •Planning the maintenance activities •Implementing the maintenance activities planned and those unforeseen •Optimizing the network capability, reliability, performance, consistency and longevity
  • 6. Assumption Network maintenance is very essential as the followings. Need to have running up the network very smoothly for our customers Before users are affected, it can monitor the network spot the problem very quickly Repairs and upgrades are also concerning for network maintenance
  • 7. Assumption Network maintenance is very essential as the followings. A crucial component of keeping your network operational by maintaining our network By not having network maintenance, our company will expand outward in every way For additional maintenance, we also need requirements for setup phase of our business Downtime is rarely an acceptable for our network
  • 8. Daily, Weekly, Monthly Checklist The components for the checklist are as follows: •Workstations, desktops and Laptops •Printers •Switches •Wireless Access Points •Routers •Servers
  • 9. Quarterly Checklist for maintenance in general Some of the important checklists are as followings: •Run performance monitor •Check redundant array of independent disks (RAID), Processor • Temperature, Event Logs, Antivirus, Backup Logs •Check Physical Cabling and Network Connectivity Speed •Perform Data Restoral Test •Update System Boot Disk, IT Inventory, Documented •Router/Switch Configuration, Network Diagram •Check Router & Switch Firmware
  • 10. NETWORK MONITORING Soe Thiha [NETWORK CONSULTANT] NetServed Pte Ltd.
  • 12. NETWORK MONITORING monitoring For administration Over active communication network For Fine Tuning  To diagnose problems  To gather statistics
  • 13. NETWORK MONITORING SOFTWARES (APPLICATIONS) PRIVATE ADULT TRAINING Performance issue Threats ALERT Reports Health of Network Environment
  • 14. OPENSOURCE VS. COMMERCIAL SOFTWARES Nagios Zabbix OPEN SOURCE Cacti COMMERCIAL Free, trial version NetCrunch
  • 16. GOALS OF NETWORK MONITORING 5 FUNCTIONAL AREAS SET BY OSI
  • 17. PYRAMID SHAPE OF NETWORK MONITORING NETWORK PROVISIONING NETWORK OPERATIONS NETWORK MAINTENANCE
  • 18. TASKLIST # Tasklist 1 Fault Management 2 Configuration Management 3 Accounting Management 4 Performance Management 5 Security Management 6 Inventory Management 7 Account billing Management
  • 19. NETWORK MONITORING PROTOCOLS  SNMP  NETCONF  CMIP  WBEM  SYSLOG  NetFlow
  • 21. TRENDS IN NETWORK MONITORING  BYOD  Converged Networks (Cellular Networks  Cloud Computing
  • 22. NETWORK SECURITY Kyaw Zin Latt [NETWORK CONSULTANT] NetServed Pte Ltd.
  • 23. NETWORK SECURITY • Access Control • Network Attacks • Ensuring CIA (Confidentiality, Integrity and Availability) • BYOD-related security issues
  • 24. ACCESS CONTROL • Operating System Access Controls • Group and Roles • Access Control List
  • 25. NETWORK ATTACKS • Eavesdropping • Data Modification • Identity Spoofing (IP Address Spoofing) • Password-Based Attack • Denial-of-Service Attack • Man-in-the-Middle Attack • Compromised-Key Attack • Sniffer Attack • Application-Layer Attack
  • 26. DEFENSE AGAINST NETWORK ATTACK • Configuration Management • Firewalls • Strengths and Limitations of Firewalls • Encryption
  • 27. ENSURING CIA • Confidentiality • Encryption • Integrity • Cryptography • Availability • Backup
  • 28. BYOD-RELATED SECURITY ISSUE • Mobile device management and data protection • Device and data loss • Over or under working • Lack of monitoring
  • 29. SOLUTIONS • Specify What Devices Are Permitted • Establish a Stringent Security Policy for all Devices • Define a Clear Service Policy for Devices Under BYOD Criteria. • Make It Clear Who Owns What Apps and Data • Decide What Apps Will Be Allowed or Banned • Set Up an Employee Exit Strategy