3. Bandwidth (Definition)
In communications, the difference between the highest and lowest
frequencies available for transmission in any given range.
• It is measured in HZ
In networking, the transmission capacity of a computer or a
communications channel, stated in megabits per second (Mbps)
Resource Monitoring & Management
3
4. Bandwidth management
It is a generic term that describes the various techniques, technologies,
tools and policies employed by an organization to enable the most efficient
use of its bandwidth resources.
It is defined as a process of allocating bandwidth resources to critical
applications on a network.
It aims to improve performance of an Internet connection by removing
unnecessary traffic.
• The aim of managing network capacity is to have the right amount of bandwidth in
the right place at the right time for the right set of users and applications.
Through efficient use, we can achieve both the minimization of
unnecessary bandwidth consumption and the delivery of the best possible
levels of service to users.
Resource Monitoring & Management 4
5. Bandwidth management
Often bandwidth management may be applied on the WAN segment that
connects the institution to the greater Internet.
It may also be applied on critical internal segments, such as segments
connecting campus residence halls to the rest of the network.
Bandwidth management is a dynamic approach that provides
adaptability, feasibility and efficiency for real-world network operations.
Resource Monitoring & Management
5
7. Monitoring
Monitoring is important for defining and enforcing policy
• Network monitoring informs the process of creating an enforceable
policy that reflects the actual needs of the user group.
• It is also required to diagnose faults and troubleshooting of the network.
Resource Monitoring & Management
7
8. Policy
Without an “Acceptable Internet Usage Policy” no amount of bandwidth
is enough to satisfy the demands of an unrestricted user community.
Frequently it is the minority that consumes the majority bandwidth.
In this situation, user education is far more productive than technical
solutions.
The institution’s policy needs to be understood and enforced.
It becomes the responsibility of the network administrators to find out
which users are not adhering to the policy and to interact with them on a face-
to-face level.
Resource Monitoring & Management 8
9. Implementation
There are number of tools and techniques that help network administrators to
ensure that bandwidth is being managed properly and policy is adhered.
The key components are:
• Network Analyzers - for monitoring traffic;
• Firewalls - for blocking malicious and unwanted traffic;
• Anti-Virus - for protecting network;
• Caches - for efficiently using bandwidth,
• Traffic Shapers - for prioritizing and controlling traffic; and
• Quota Systems - for managing user behavior.
Resource Monitoring & Management 9
10. It is a networked computer used to store files for access by other client
computers on the network
On larger networks, the file server runs a special network operating system.
On smaller installations, the file server may run a PC operating system
supplemented by peer-to-peer networking software.
Resource Monitoring & Management 10
File Server
11. Mail - In the networking world, e-mail, rather than the postal service.
Email servers can be of two types:
1. Incoming Mail Server (POP3, IMAP)
2. Outgoing Mail Server (SMTP)
Resource Monitoring & Management 11
Mail Servers
12. The incoming mail server is the server associated with an email address account.
There cannot be more than one incoming mail server for an email account.
In order to download your emails, you must have the correct settings configured
in your email client program.
Popular protocols are POP3 and IMAP
Post Office Protocol (POP) - the latest version is POP3 and it is an Internet mail
server protocol that provides an incoming mail storage mechanism
Internet Mail Access Protocol (IMAP)- is a protocol that defines how users can
access and store incoming e-mail messages.
Resource Monitoring & Management 12
Incoming Mail Server
13. Most outgoing mail servers use SMTP (Simple Mail Transfer Protocol) for
sending emails.
SMTP provides a direct end-to-end mail delivery, which is rather unusual;
most mail systems use store-and-forward protocols
The outgoing mail server can belong to your ISP or to the server where you
setup your email account.
Resource Monitoring & Management 13
Outgoing Mail Server
14. POP3 – port 110
IMAP – port 143
SMTP – port 25
Secure SMTP (SSMTP) – port 465
Secure IMAP (IMAP4-SSL) – port 585
IMAP4 over SSL (IMAPS) – port 993
Secure POP3 (SSL-POP) – port 995
Resource Monitoring & Management 14
The main email ports are
15. The network should be configured for sharing printers to enable network printing.
Local printer, shared printer, and network printer are the three basic printing
configurations used while designing a network and configuring printers.
Resource Monitoring & Management 15
Network Printers
16. Network printer has network interface card and it is directly
connected to LAN via Ethernet cable, it has its own IP address
and accessible throughout the subnet.
Network printer is used for large organizations where you need to
visualize and manage the printing activities, independently.
Resource Monitoring & Management 16
Network Printers
17. It is refers to any method of controlling a computer from a remote location
(i.e. a computer in the next room or one on the other side of the world).
Any computer with an Internet connection, TCP/IP or on a Local Area Network
can be remotely administered.
Resource Monitoring & Management 17
Remote Administration
18. Shutdown
• Shutting down or rebooting another computer over a network
Accessing Peripherals
• Using a network device, like printer
• Retrieving streaming data, much like a CCTV system
Modifying
• Editing another computer's registry settings
• Modifying system services
• Installing software on another machine
• Modifying logical groups
Resource Monitoring & Management 18
Common tasks for which remote administration is used
19. Viewing
• Remotely assisting others
• Supervising computer or internet usage
Hacking
• Computers infected with malware such as Trojans sometimes open back
doors into computer systems which allows malicious users to hack into and
control the computer. Such users may then add, delete, modify or execute
files on the computer to their own ends.
Resource Monitoring & Management 19
Common tasks for which remote administration is used
20. Windows
• Windows based devices come with Microsoft's Microsoft Management
Console, Windows Registry Editor and various command-line utilities
that may be used to administrate a remote machine.
• One form of remote administration is remote desktop software, and
Windows includes a Remote Desktop Connection client for this purpose.
Non-Windows
• Linux, UNIX and BSD support remote administration via remote login,
typically via SSH (The use of the Telnet protocol has been phased out due
to security concerns).
• Apple Remote Desktop provides Macintosh users with remote
administration capabilities.
Resource Monitoring & Management 20
Popular Software for Remote Administration