Chapter Thirteen Maintaining and Upgrading

868 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
868
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
14
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • How does a doctor know when your blood pressure is too high? When your heart is beating too fast? What are the first things that are checked when a person goes into the doctor? Why? We know the baseline…what’s normal for most people, when we measure someone’s blood pressure and it doesn’t fall within “normal” we can start looking for the cause. But what if we didn’t know what was “normal”
  • Need to know where equipment is located, the specifications of the equipment, and what programs and services are being run on the equipment. Need to track the changes made to the system so that you and those that follow you will be able to respond quickly and efficiently. If you don’t know where the equipment is located or what changes have been made to the equipment, your job as a network administrator or technician will be a lot more difficult.
  • Don’t use email to inform users that the email system is down or that they won’t have access to the network…how are they supposed to get the message. If replacing a hub, inform users that they will be down for a period of time Can affect many users Need to plan in advance so that you can minimize disruption to users Can require extensive programming Should be done at times when system is not in use or when a minimum number of users will be affected
  • e.g., having two NIC cards installed in a server;
  • Signature—identifying characteristics of virus; might be a string of characters Checks the size of files to verify that they aren’t changing without a reason
  • Failure Deviation from a specified level of system performance for a given period of time Fault Involves the malfunction of one component of a system The cause of a failure; what’s broke
  • Identify point(s) in the network that if failure occurs lost of data or connectivity will occur.
  • Fire, flood, heat, dirt, earthquakes Line noise (EMI)
  • Specifies how often backups will occur and the type(s) of backups to be performed Friday—Full backup of all data Monday—Incremental backup (everything that’s changed since Friday Tuesday—Incremental backup Wednesday—Incremental backup Thursday—Incremental backup Friday—Full backup Keep older tapes on hand in case today’s backup fails
  • Chapter Thirteen Maintaining and Upgrading

    1. 1. Chapter Thirteen <ul><li>Maintaining </li></ul><ul><li>and Upgrading </li></ul><ul><li>a Network </li></ul>
    2. 2. Keeping Track <ul><li>Establish the baseline for your network </li></ul><ul><ul><li>Baselining </li></ul></ul><ul><ul><ul><li>Practice of measuring and recording a network’s current state of operation </li></ul></ul></ul><ul><li>System’s performance may begin to degrade, sometimes gradually at other times dramatically. </li></ul><ul><ul><li>Compare baseline observation to current system behavior. </li></ul></ul>
    3. 3. Keeping Track <ul><li>Asset management </li></ul><ul><ul><li>System of identifying and tracking the hardware and software on your network </li></ul></ul><ul><ul><li>Record information about how your network is set up and why </li></ul></ul><ul><ul><li>Physical network layout </li></ul></ul><ul><ul><li>Documentation on licensing agreements </li></ul></ul><ul><li>Change management </li></ul><ul><ul><li>Use your change management system to record any changes resulting from network maintenance or upgrades </li></ul></ul>
    4. 4. Software Changes <ul><li>General steps for software changes </li></ul><ul><ul><li>Determine whether the change is necessary </li></ul></ul><ul><ul><ul><li>Research the purpose of the change and its potential effects on other programs </li></ul></ul></ul><ul><ul><li>Determine whether the change should apply to some or all user and whether it will be distributed centrally or machine-by-machine </li></ul></ul><ul><ul><li>If you decide to implement the change, notify system administrators, help desk personnel, and users </li></ul></ul><ul><ul><ul><li>Make sure that people get appropriate training </li></ul></ul></ul>
    5. 5. Software Changes <ul><li>General steps for software changes (cont.) </li></ul><ul><ul><li>Back up current system or software before making any modifications </li></ul></ul><ul><ul><li>Prevent users from accessing the system or part of the system being altered </li></ul></ul><ul><ul><li>Keep the upgrade instructions handy and follow them during installation of the patch or revision </li></ul></ul><ul><ul><li>Make the change </li></ul></ul>
    6. 6. Software Changes <ul><li>General steps for software changes (cont.) </li></ul><ul><ul><li>Test the system fully after the change, preferably using the software as a typical user would </li></ul></ul><ul><ul><li>If the change was successful, re-enable access to the system; if unsuccessful, revert to previous system version of the software </li></ul></ul><ul><ul><li>Inform system administrators, help desk personnel, and users when the change is complete </li></ul></ul><ul><ul><li>Record the change in the change management system </li></ul></ul>
    7. 7. Software Changes <ul><li>Patch </li></ul><ul><ul><li>Improvement or enhancement to a particular piece of a software program </li></ul></ul><ul><ul><ul><li>May be released to fix major bugs in the original program </li></ul></ul></ul><ul><ul><ul><ul><li>Bug--Flaw in a software program that causes some part of the program to malfunction </li></ul></ul></ul></ul><ul><ul><li>Service pack </li></ul></ul><ul><ul><ul><li>Term Microsoft uses for its significant patches for Windows NT Server and Windows 2000 </li></ul></ul></ul>
    8. 8. Software Changes <ul><li>Upgrade </li></ul><ul><ul><li>Major change to existing code </li></ul></ul><ul><ul><li>May or may not be offered free from a vendor </li></ul></ul><ul><ul><li>In general, upgrades are designed to add functionality and fix bugs </li></ul></ul>
    9. 9. Software Changes <ul><li>Application upgrades </li></ul><ul><ul><li>Represent modifications to all or part of a program that are designed to enhance functionality or fix problems related to software </li></ul></ul><ul><ul><li>Apply to software shared by clients on the network </li></ul></ul><ul><ul><ul><li>For example, an upgrade of the database program used to store all the client records </li></ul></ul></ul>
    10. 10. Network Operating System Upgrades <ul><li>Considerations for NOS upgrade </li></ul><ul><ul><li>Affect on user IDs, groups, rights, and policies </li></ul></ul><ul><ul><li>Affect on file, printer, and directory access on the server </li></ul></ul><ul><ul><li>Affect on applications or client interactions on the server </li></ul></ul><ul><ul><li>Affect on configuration files, protocols, and services running on the server </li></ul></ul>
    11. 11. Network Operating System Upgrades <ul><li>Considerations for NOS upgrade (cont.) </li></ul><ul><ul><li>Affect on the server’s interaction with other devices on the network </li></ul></ul><ul><ul><li>Accurately testing the upgrade software in simulated environment </li></ul></ul><ul><ul><li>Taking advantage of the new operating system to make your system more efficient </li></ul></ul><ul><ul><li>Having resources available during upgrade process to address any problems </li></ul></ul>
    12. 12. Network Operating System Upgrades <ul><li>Considerations for NOS upgrade (cont.) </li></ul><ul><ul><li>Allot enough time to perform the upgrade </li></ul></ul><ul><ul><li>Ensure that users, help desk personnel, and system administrators understand how the upgrade will affect their daily operations and support burdens </li></ul></ul><ul><ul><ul><li>Training </li></ul></ul></ul><ul><ul><ul><li>What’s new memos/emails </li></ul></ul></ul>
    13. 13. Steps for NOS Upgrade <ul><li>Research </li></ul><ul><li>Proposal </li></ul><ul><li>Evaluation </li></ul><ul><li>Training </li></ul><ul><li>Pre-implementation </li></ul><ul><li>Implementation </li></ul><ul><li>Post-implementation </li></ul>
    14. 14. Reversing a Software Upgrade <ul><li>Backleveling </li></ul><ul><ul><li>Process of reverting to a previous version of software after attempting to upgrade it </li></ul></ul><ul><ul><li>Use the operating system uninstall feature (if available) </li></ul></ul><ul><ul><li>Restore from backups </li></ul></ul>
    15. 15. Hardware and Physical Plant Changes <ul><li>Guide for changing network hardware </li></ul><ul><ul><li>Determine whether the upgrade is necessary </li></ul></ul><ul><ul><li>If possible, back up the current hardware’s configuration </li></ul></ul><ul><ul><li>Let people that will be affected know that you are making the change, when, and why </li></ul></ul><ul><ul><li>After change, test the hardware to insure that it is fully operational before allowing users to access </li></ul></ul><ul><ul><li>Record the change </li></ul></ul>
    16. 16. Adding or Upgrading Equipment <ul><li>Networked workstation </li></ul><ul><li>Networked printer </li></ul><ul><li>Hub </li></ul><ul><li>Server </li></ul><ul><li>Switches or routers </li></ul>
    17. 17. Adding or Upgrading Equipment <ul><li>The best way to safely gain experience with adding, upgrading, or repairing devices is to experiment with devices that are not currently used on a network </li></ul><ul><li>Bear in mind that adding a new processor to a server, a new NIC to a router, or more memory to a printer may affect your service or warranty agreement with the manufacturer </li></ul>
    18. 18. Cabling Upgrades and Backbone Upgrades <ul><li>Cabling upgrades </li></ul><ul><ul><li>May require significant planning and time to implement, depending on the size of your network </li></ul></ul><ul><li>Backbone upgrades </li></ul><ul><ul><li>The most comprehensive and complex upgrade involving network hardware </li></ul></ul>
    19. 19. Reversing Hardware Changes <ul><li>As with software changes, you should provide a way to reverse the hardware upgrade and reinstall the old hardware if necessary </li></ul><ul><li>Keep the old component safe, as you not only might you need to put it back in the device, but you might also need to refer to it for information </li></ul>
    20. 20. Managing Growth and Change <ul><li>Factors that might influence currently developing trends in networking technology </li></ul><ul><ul><li>Faster data transmission and greater accessibility will bring network access to more people in less time </li></ul></ul><ul><ul><li>Increasing compatibility between vendors </li></ul></ul><ul><ul><li>Open standards will make networking careers less specialized and probably more interesting </li></ul></ul><ul><ul><li>Smarter devices will contribute to each of the above trends, enabling the development of faster, more open standards and providing greater accessibility </li></ul></ul>
    21. 21. Researching Network Trends <ul><li>Magazines, industry associations, colleagues, Internet </li></ul><ul><li>Newsgroups on the Web can provide valuable information, too </li></ul>
    22. 22. Chapter Fourteen <ul><li>Ensuring Integrity </li></ul><ul><li>and Availability </li></ul>
    23. 23. What Are Integrity and Availability? <ul><li>Integrity </li></ul><ul><ul><li>Reliability and accuracy of a network’s programs, data, services, devices, and connections </li></ul></ul><ul><li>Availability </li></ul><ul><ul><li>Refers to how consistently and reliably a system can be accessed by authorized personnel </li></ul></ul>
    24. 24. Guidelines for Protecting Your Network <ul><li>Prevent anyone other than a network administrator from opening or changing the system files </li></ul><ul><li>Monitor the network for unauthorized access or change </li></ul><ul><ul><li>Process of monitoring a network for unauthorized access to its devices is known as intrusion detection </li></ul></ul><ul><li>Record authorized system changes in a change management system </li></ul>
    25. 25. Guidelines for Protecting Your Network <ul><li>Install redundant components </li></ul><ul><ul><li>Situation in which more than one component is installed and ready for use for storing, processing, or transporting is referred to as redundancy </li></ul></ul><ul><li>Perform regular health checks on the network </li></ul><ul><li>Monitor system performance, error logs, and the system log book regularly </li></ul><ul><li>Keep backups, boot disks, and emergency repair disks current and available </li></ul><ul><li>Implement and enforce security and disaster recovery policies </li></ul>
    26. 26. Virus <ul><li>Program that contains code that may cause the loss of data </li></ul><ul><ul><li>replicates itself so as to infect more computers </li></ul></ul><ul><li>Trojan horse </li></ul><ul><ul><li>Program that is disguised itself as something useful but actually harms your system </li></ul></ul>
    27. 27. Types of Viruses <ul><li>Boot sector viruses </li></ul><ul><ul><li>Reside on the boot sector of a floppy disk and become transferred to the partition sector or the DOS boot sector on a hard disk </li></ul></ul><ul><li>Macro Viruses </li></ul><ul><ul><li>Take the form of a word-processing or spreadsheet program macro </li></ul></ul><ul><li>File infected viruses </li></ul><ul><ul><li>Attach themselves directly to the file </li></ul></ul>
    28. 28. Types of Viruses <ul><li>Network viruses </li></ul><ul><ul><li>Propagate themselves via network protocols, commands, messaging programs, and data links </li></ul></ul><ul><li>Worms </li></ul><ul><ul><li>Technically not viruses, but rather programs that run independently and travel between computers across networks </li></ul></ul>
    29. 29. Virus Characteristics <ul><li>Encryption </li></ul><ul><ul><li>Format that virus checker can’t read </li></ul></ul><ul><li>Stealth </li></ul><ul><ul><li>Hide within a program </li></ul></ul><ul><li>Polymorphism </li></ul><ul><ul><li>Change themselves as they move from system to system </li></ul></ul><ul><li>Time-dependence </li></ul><ul><ul><li>Only activate on a particular date </li></ul></ul>
    30. 30. Antivirus Software <ul><li>Symptoms of a virus </li></ul><ul><ul><li>Unexplained increases in file sizes </li></ul></ul><ul><ul><li>Programs launching, running, or exiting more slowly than usual </li></ul></ul><ul><ul><li>Unusual error messages appearing without probable cause </li></ul></ul><ul><ul><li>Significant, unexpected loss of system memory </li></ul></ul><ul><ul><li>Fluctuations in display quality </li></ul></ul>
    31. 31. Antivirus Software <ul><li>Functions your antivirus software should perform </li></ul><ul><ul><li>Signature scanning </li></ul></ul><ul><ul><ul><li>Comparison of a file’s content with known virus signatures in a signature database </li></ul></ul></ul><ul><ul><li>Integrity checking </li></ul></ul><ul><ul><ul><li>Method of comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes </li></ul></ul></ul><ul><ul><li>It should detect viruses by monitoring unexpected file changes or virus-like behaviors </li></ul></ul>
    32. 32. Antivirus Software <ul><li>Functions your antivirus software should perform (cont.) </li></ul><ul><ul><li>Receive regular updates and modifications from a centralized network console </li></ul></ul><ul><ul><li>Consistently report only valid viruses, rather than reporting “false alarms” </li></ul></ul>
    33. 33. Antivirus Policy <ul><li>General guidelines for an antivirus policy </li></ul><ul><ul><li>Every computer in an organization should be equipped with virus detection and cleaning software that regularly scans for viruses </li></ul></ul><ul><ul><li>Users should not be allowed to alter or disable the antivirus software </li></ul></ul><ul><ul><li>Users should know what to do in case their antivirus program detects a virus </li></ul></ul><ul><ul><li>Users should be prohibited from installing any unauthorized software on their systems </li></ul></ul><ul><ul><li>Organizations should impose penalties on users who do not follow the antivirus policy </li></ul></ul>
    34. 34. Virus Hoaxes <ul><li>False alert about a dangerous, new virus that could cause serious damage to your workstation </li></ul><ul><li>Usually have no realistic basis and should be ignored </li></ul>
    35. 35. Fault Tolerance <ul><li>Capacity for a system to continue performing despite an unexpected hardware or software malfunction </li></ul><ul><li>Fault tolerant systems provide redundancy or duplication of critical components </li></ul>
    36. 36. Fault Tolerance <ul><li>Fail-over </li></ul><ul><ul><li>Process of one component immediately assuming the duties of an identical component </li></ul></ul><ul><li>Hot swappable </li></ul><ul><ul><li>Identical components that automatically assume the functions of their counterpart if one suffers a fault </li></ul></ul><ul><li>Single point of failure </li></ul><ul><ul><li>Point on a network where, if a fault occurs, the transfer of data may break down without possibility of an automatic recovery </li></ul></ul>
    37. 37. Environment and Power <ul><li>Environment </li></ul><ul><ul><li>Analyze the physical environments in which your devices operate </li></ul></ul><ul><ul><li>How well are your critical network components protected from environmental hazards </li></ul></ul><ul><li>Power </li></ul><ul><ul><li>Whatever the cause, networks cannot tolerate power loss or less than optimal power </li></ul></ul><ul><ul><ul><li>Surge </li></ul></ul></ul><ul><ul><ul><li>Line noise </li></ul></ul></ul><ul><ul><ul><li>Brownout--Also known as a sag </li></ul></ul></ul><ul><ul><ul><li>Blackout </li></ul></ul></ul>
    38. 38. Uninterruptible Power Supply (UPS) <ul><li>Battery-operated power source directly attached to one or more devices and to a power supply </li></ul><ul><li>Standby UPS--Switches instantaneously to the battery when it detects a loss of power from the wall outlet </li></ul><ul><li>Online UPS--Uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery </li></ul>
    39. 39. Factors in Choosing a UPS <ul><li>Amount of power needed </li></ul><ul><ul><li>A volt-amp (VA) is the product of the voltage and current of the electricity on a line </li></ul></ul><ul><li>Period of time to keep a device running </li></ul><ul><li>Line conditioning—surge and line noise protection </li></ul><ul><li>Cost </li></ul><ul><ul><li>Low-end --$50-$300 </li></ul></ul><ul><ul><li>Higher-end--$200-$3000 </li></ul></ul>
    40. 40. Generators <ul><li>If your organization cannot withstand a power loss of any duration, consider investing in an electrical generator for your building </li></ul><ul><li>Gas or diesel powered </li></ul><ul><li>Cost for industrial-type--$10,000-1M+ </li></ul>
    41. 41. Redundant Topologies <ul><li>Mesh or Hybrid Mesh Topology </li></ul><ul><ul><li>Provide redundant connections between network components </li></ul></ul><ul><li>FDDI and SONET Topology </li></ul><ul><ul><li>Dual rings provide fault tolerance </li></ul></ul>
    42. 42. Redundant Storage—RAID <ul><li>Redundant Array of Inexpensive (or Independent) Disks </li></ul><ul><ul><li>A group of hard disks is called a disk array </li></ul></ul><ul><li>A sophisticated means for dynamically duplicating or storing data using several physical hard drives </li></ul><ul><li>Provides fault tolerance for data </li></ul><ul><li>There are several levels of RAID </li></ul><ul><ul><li>0, 1, 5 are the levels most commonly used in Windows-based networks </li></ul></ul>
    43. 43. RAID Level 0—Disk Striping <ul><li>Simple implementation of RAID in which data are written in 64 KB blocks equally across all disks in the array </li></ul><ul><li>No duplication of data--not actually fault tolerant because if one of the disks fails, you will still lose all your data </li></ul><ul><li>Requires a minimum of two drives and can support up to 32 </li></ul><ul><li>Fast because data can be written to multiple drives simultaneously </li></ul>
    44. 44. RAID Level 1—Disk Mirroring <ul><li>Data from one disk are copied to another disk automatically as the information is written </li></ul><ul><li>Makes an exact copy of a partition on one hard disk to a partition on another hard disk </li></ul>
    45. 45. RAID Level 5—Disk Stripping with Distributed Parity <ul><li>Data are written in small blocks across several disks </li></ul><ul><li>Includes error correction information (parity) so that if one of the disks fails the lost data can be recovered from the other disks </li></ul><ul><li>Requires at least 3 partitions of the same size. Each partition should be on a different hard disk. </li></ul>
    46. 46. Server Mirroring and Server Clustering <ul><li>Server mirroring </li></ul><ul><ul><li>Fault tolerance technique in which one server duplicates the transactions and data storage of another </li></ul></ul><ul><ul><ul><li>Servers must be identical machines; same processor, same type/size hard disk(s), etc. </li></ul></ul></ul><ul><ul><ul><li>Can slow network performance </li></ul></ul></ul><ul><li>Server clustering </li></ul><ul><ul><li>Fault tolerance technique that links multiple servers together to act as a single server </li></ul></ul>
    47. 47. Data Backup <ul><li>Copy of data and program files created for archiving purposes </li></ul><ul><li>Backups should be stored in a safe, fireproof location </li></ul><ul><li>Good idea to store off site </li></ul><ul><li>Backing up can generate high network traffic </li></ul><ul><ul><li>Pick a time when there is little or no network traffic </li></ul></ul>
    48. 48. Tape Backups <ul><li>Questions to ask when selecting the appropriate tape backup solution for your network </li></ul><ul><ul><li>Does the backup drive and/or media storage capacity? </li></ul></ul><ul><ul><li>Are the backup software and hardware reliable? </li></ul></ul><ul><ul><li>Does the backup software use data error checking techniques? </li></ul></ul><ul><ul><li>Is the system quick enough to complete the backup process before daily operations resume? </li></ul></ul><ul><ul><li>How much do the tape drive, software and media cost? </li></ul></ul><ul><ul><li>Will the backup hardware and software be compatible with existing network hardware and software? </li></ul></ul><ul><ul><li>Does the backup system require frequent manual intervention? </li></ul></ul>
    49. 49. Backup Strategy <ul><li>Questions to ask in developing a backup strategy </li></ul><ul><ul><li>What kind of rotation schedule will backups follow? </li></ul></ul><ul><ul><li>At what time of day or night will the backups occur? </li></ul></ul><ul><ul><li>How will you verify the accuracy of the backups? </li></ul></ul><ul><ul><li>Where will backup media be stored? </li></ul></ul><ul><ul><li>Who will take responsibility for ensuring that backups occurred? </li></ul></ul><ul><ul><li>How long will you save backups? </li></ul></ul><ul><ul><li>Where will backup and recovery documentation be stored? </li></ul></ul>
    50. 50. Backup Strategy Methods <ul><li>Full </li></ul><ul><ul><li>Backs up all selected files </li></ul></ul><ul><li>Incremental backup </li></ul><ul><ul><li>Backs up data that have changed since the last backup (full or incremental) </li></ul></ul><ul><li>Differential backup </li></ul><ul><ul><li>Backs up data that have changed since the last full backup </li></ul></ul>
    51. 51. Disaster Recovery <ul><li>Process of restoring critical functionality and data after enterprise-wide outage that affects more than a single system or limited group of users </li></ul><ul><li>Must take into account the possible extremes, rather than relatively minor situations </li></ul>
    52. 52. Pertinent Issues to a Data Recovery Plan <ul><li>Contact names for emergency coordinators who will execute the disaster recovery response </li></ul><ul><li>Details on which data and servers are being backed up, how frequently backups occur, where backups are kept, and how backup data can be recovered in full </li></ul><ul><li>Details on network topology, redundancy, and agreements with national service carriers </li></ul><ul><li>Regular strategies for testing the disaster recovery plan </li></ul><ul><li>Plan for managing the crisis </li></ul>

    ×