SlideShare a Scribd company logo
Chapter 15:  Implementing and Managing Networks Network+ Guide to Networks
Objectives Describe the elements and benefits of project management Manage a network implementation project Understand network management and the importance of base lining to assess a network’s health
Objectives (continued) Plan and follow regular hardware and software maintenance routines Describe the steps involved in upgrading network software and hardware
Project Management Project Management Is the practice of managing resources, staff, budget, timelines, and other variables to achieve a specific goal within given bounds Project management attempts to answer at least the following questions in roughly the following order: Is the proposed project feasible? What needs must the project address?
Project Management (continued) What are the project’s goals? (What are the standards for success?) What tasks are required to meet the goals? How long should tasks take, and in what order should they be undertaken? What resources are required to accomplish the tasks, and how much will they cost?
Project Management (continued) Who will be involved and what skills must they possess? How will staff communicate with others about the project? After completion, did the project meet the stated need? A project can be divided into four phases
Project Management (continued)
Determining Project Feasibility Before committing money and time to a project, you must decide whether the proposed project is possible and whether it’s feasible Feasibility study outlines the costs and benefits of the project and attempts to predict whether it will result in a favorable outcome
Determining Project Feasibility (continued) Feasibility study might consist of rough estimates for the following: Costs of equipment, connectivity, consulting services Required staff time for project participation, training, and evaluation
Duration of project Decrease in productivity due to disruption versus increase in future productivity due to better network and client performance A conclusion that addresses whether the costs (equipment, staff, decreased productivity) justify the benefits (increased ongoing productivity) Determining Project Feasibility (continued)
Determining Project Feasibility (continued) Often, organizations hire business consultants to help them develop a feasibility study Advantage to outsourcing this work is that consultants do not make the same assumptions that internal staff might make when weighing the costs and benefits of a proposed project
Assessing Needs Needs assessment is the process of clarifying the reasons and objectives underlying a proposed change Involves interviewing users and comparing perceptions to factual data May involve analyzing network baseline data
Assessing Needs (continued) A needs assessment may address the following questions: Is the expressed need valid, or does it mask a different need? Can the need be resolved?
Assessing Needs (continued) Is the need important enough to allocate resources to its resolution? Will Meeting the need have a measurable effect on productivity?
Assessing Needs (continued) If fulfilled, will the need result in additional needs? Will fulfilling the need satisfy other needs? Do users affected by the need agree that change is a good answer? What kind of resolution will satisfy them?
Assessing Needs (continued) A network’s needs and requirements should be investigated as they relate to: Users Network performance
Assessing Needs (continued) Availability Scalability Integration Security
Setting Project Goals Project goals help keep a project on track Evaluating whether a project was successful A popular technique for setting project goals is to begin with a broad goal, then narrow it down into specific goals that contribute to the larger goal Project goals should be attainable
Setting Project Goals (continued) Feasibility study should help determine whether you can achieve the project goals within the given time, budgetary, and resource constraints
Setting Project Goals (continued) If project goals are not attainable from the outset, you risk losing backing from  project participants, users, and the managers who agree with the project’s goals and who will strive to help you achieve them
Setting Project Goals (continued) Managers and others who oversee resource allocation are called sponsors
Project Planning Project plan organizes the details of a managed project Small projects may take the form of a simple text or spreadsheet document
Project Planning (continued) Larger projects, however, you typically take advantage of project management software such as Microsoft Project or PrimaVera Project Planner Project management software facilitates project planning by providing a framework for inputting tasks, timelines, resource assignments (identifying which staff are responsible for each task), completion dates, and so on
Project Planning (continued)
Tasks and Timelines Project should be divided into specific tasks Break larger tasks into smaller subtasks Identify tasks, you can assign a duration, start date, and finish date to each task and subtask in the project plan
Tasks and Timelines (continued) Designate milestones, task priority, and how the timeline might change depending on resource availability or dependencies A Gantt chart is a popular method for depicting when projects begin and end along a horizontal timeline
Tasks and Timelines (continued)
Communication Communication is necessary to ensure that all participants understand the project’s goals It helps keep a project’s budget and timeline on track, encourage teamwork, avoid duplicate efforts, and allows learning from previous mistakes
Communication (continued) Project manager is responsible for facilitating regular, effective communication among project participants Project managers must ensure consistent communication with all project stakeholders
Communication (continued) A stakeholder is any person who is affected by the project; for example, in the Wyndham School District upgrade project, stakeholders include:  Teachers Administrators Technical staff Students, because students are also network users
Contingency Planning Unforeseen circumstances Contingency planning Pilot Network The following tips will help you create a more realistic and useful pilot network:
Include at least one of each type of device (whether a critical router or a client workstation) that might be affected by the change Use the same transmission methods and speeds as employed on your network  Contingency Planning (continued)
Try to emulate the number of segments, protocols, and addressing schemes in your network.  Implement the same server and client software and configurations on your pilot network as found in your current network (unless they are part of the change you’re testing) Contingency Planning (continued)
Once you have established the pilot network Test it for at least two weeks to verify that its performance, security, availability, or other characteristics meet your criteria Contingency Planning (continued)
Network Management Network management refers to the assessment, monitoring, and maintenance of all aspects of a network Baselining is the practice of measuring and recording a network’s current state of operation
Baselining
Baseline assessment should address the following questions: Access method Protocols Devices Operating systems Applications
Performance and Fault Management Performance management (monitoring how well links and devices are keeping up with the demands placed on them) Fault management (the detection and signaling of device, link, or component faults)
Performance and Fault Management (continued) To accomplish both performance and fault management, organizations often use enterprise-wide network management software Polling Network management agent
Performance and Fault Management (continued) Management information base (MIB) by definition are where managed objects and their data are collected Agents communicate information about managed objects via any one of several Application layer protocols
Performance and Fault Management (continued) Once data is collected, the network management program can present an administrator with several ways to view and analyze the data
Network Management
Network Status
Network Management (continued) One of the most common network management tools used on WANs is the Multi Router Traffic Grapher (MRTG) MRTG is a command-line program that uses SNMP to poll devices, collects data in a log file, then generates HTML-based views of the data
Network Management (continued) MRTG is freely distributed software originally written by Tobias Oetiker MRTG can be used with UNIX- and Windows-based operating systems and can collect and graph data from any type of device that uses SNMP
Network Management Graphs
Asset Management A key component in network evaluation is identifying and tracking the hardware and software on your network, a process called asset management Asset management is to take an inventory of each node on the network
Asset Management (continued) Inventory should include the total number of components on the network, and also each device’s configuration files, model number, serial number, location on the network, and technical support contact
Software Changes 1. Determine whether the change (whether it be a patch, revision, or upgrade) is necessary 2. Research the purpose of the change and its potential effects on other programs 3. Determine whether the change should apply to some or all users and whether it will be distributed centrally or machine-by-machine
Software Changes (continued) 4. If you decide to implement the change, notify system administrators, help desk personnel, and users. Schedule the change for completion during off hours (unless it is an emergency) 5. Back up the current system or software before making any modifications
Software Changes (continued) 6. Prevent users from accessing the system or part of the system being altered (for example, disable logons) 7. Keep the upgrade instructions handy and follow them during installation of the patch or revision 8. Make the change
Software Changes (continued) 9. Test the system fully after the change 10. If the change was successful, reenable access to the system and if it was unsuccessful, revert to the previous version of the software
Software Changes (continued) 11. Inform system administrators, help desk personnel, and users when the change is complete. If you had to reverse it, explain why 12. Record your change in the change management system.
Patches A general rule, upgrading or patching software according to a vendor’s recommendations is a good idea and can often prevent network problems
Patches (continued) Patches is a correction, improvement, or enhancement to a particular piece of a software program Differs from a revision or software upgrade in that it changes only part of a software program, leaving most of the code untouched Are often distributed at no charge by software vendors in an attempt to fix a bug in their code or to add slightly more functionality
Client Upgrades Software upgrade is a major change to a software package’s existing code An upgrade to the client program replaces the existing client program
Client Upgrades (continued) Upgrades are designed to add functionality and fix bugs in the previous version of the client A client upgrade may be transparent to users, or it may completely change the appearance of the network logon interface
Application Upgrades Application upgrades, apply to software shared by clients on the network Back up the current software before upgrading it
Application Upgrades (continued) Prevent users from accessing the software during the implementation Keep users and system administrators informed of all changes.
Network Operating System Upgrades Most Critical Involves significant, potentially drastic, changes to the way your servers and clients operate Have a project plan covering the upgrade procedure
Network Operating System Upgrades (continued) How will the upgrade affect user IDs, groups, rights, and policies? How will the upgrade affect file, printer, and directory access, applications or client interactions on the server?
Network Operating System Upgrades (continued) How will the upgrade affect configuration files, protocols, and services running on the server? How will the upgrade affect the server’s interaction with other devices on the network?
Network Operating System Upgrades (continued) How accurately can you test the upgrade software in a simulated environment? How can you take advantage of the new operating system to make your system more efficient?
Network Operating System Upgrades (continued) What is your technical support arrangement with the operating system’s manufacturer if you need help in the midst of the upgrade? Have you allotted enough time to perform the upgrade? (For example, would it be more appropriate to do it over a weekend rather than overnight?)
Network Operating System Upgrades (continued) Have you ensured that the users, help desk personnel, and system administrators Understand how the upgrade will affect their daily operations and support burdens?
Network Operating System Upgrades (continued) The following steps demonstrate how careful planning and a methodical process can help you accomplish an NOS upgrade Research Proposal Evaluation Training
Network Operating System Upgrades (continued) Pre-implementation Implementation Post-implementation
Reversing a Software Upgrade
Hardware and Physical Plant Changes Determine whether the change is necessary Research the upgrade’s potential effects on other devices, functions, and users Notify system administrators, help desk personnel, and users, and schedule it during off-hours (unless it is an emergency)
Hardware and Physical Plant Changes (continued) Back up and print the hardware’s configuration Prevent users from accessing the system or the part of the system that you are changing
Hardware and Physical Plant Changes (continued) Keep the installation instructions and hardware documentation handy Implement the change and test the hardware fully  If the change was successful, re-enable access to the device and If it was unsuccessful, isolate the device or reinsert the old device, if possible
Hardware and Physical Plant Changes (continued) Inform system administrators, help desk personnel, and users when the change is complete. If it was not successful, explain why Record your change in the change management system
Adding or Upgrading Equipment Networked workstation is the simplest device to add Networked printer is easy to add to your network and is slightly more complex than adding a networked workstation HUB (4-64 users)
Adding or Upgrading Equipment Servers are more complex and need a great deal of prior planning Switches and Routers are more complex
Adding or Upgrading Equipment (continued) Cabling upgrades may require significant planning and time to implement, depending on the size of your network Backbone upgrade is the most comprehensive and complex upgrade involving a network
Adding or Upgrading Equipment (continued) Reversing Hardware Changes Provide a way to reverse the hardware upgrade and reinstall the old hardware if necessary
Summary Describe the elements and benefits of project management Manage a network implementation project Base-lining to assess a network’s health
Summary (continued) Hardware and software maintenance routines Steps involved in upgrading network software and hardware

More Related Content

What's hot (20)

PPT
Ch14
ckiranku
 
DOCX
Cyber Security Improvement Plan
Nicole Valerio
 
PPT
Lecture week8
ismaelhaider
 
PDF
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
PDF
A survey of online failure prediction methods
unyil96
 
PPTX
Ch13 security engineering
software-engineering-book
 
PDF
An efficient intrusion detection using relevance vector machine
IAEME Publication
 
PDF
Network Architecture Review Checklist
Eberly Wilson
 
PPTX
PACE-IT: Risk and Security Related Concepts
Pace IT at Edmonds Community College
 
PDF
Network DDoS Incident Response Cheat Sheet (by SANS)
Martin Cabrera
 
PPT
Software security engineering
aizazhussain234
 
PDF
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET Journal
 
PPT
Cp7101 design and management of computer networks-requirements analysis 2
Dr Geetha Mohan
 
PDF
Ct2 presentation stevens
Elizabeth Stevens
 
PPT
Malware Incident Response
Rajdeep CISSP, ECSA, CEH
 
PPT
Critical System Specification in Software Engineering SE17
koolkampus
 
PDF
www.ijerd.com
IJERD Editor
 
PPT
SA Chapter 7
Nuth Otanasap
 
PPTX
PACE-IT: Common Threats (part 1)
Pace IT at Edmonds Community College
 
PPT
SA Chapter 2
Nuth Otanasap
 
Ch14
ckiranku
 
Cyber Security Improvement Plan
Nicole Valerio
 
Lecture week8
ismaelhaider
 
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
A survey of online failure prediction methods
unyil96
 
Ch13 security engineering
software-engineering-book
 
An efficient intrusion detection using relevance vector machine
IAEME Publication
 
Network Architecture Review Checklist
Eberly Wilson
 
PACE-IT: Risk and Security Related Concepts
Pace IT at Edmonds Community College
 
Network DDoS Incident Response Cheat Sheet (by SANS)
Martin Cabrera
 
Software security engineering
aizazhussain234
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET Journal
 
Cp7101 design and management of computer networks-requirements analysis 2
Dr Geetha Mohan
 
Ct2 presentation stevens
Elizabeth Stevens
 
Malware Incident Response
Rajdeep CISSP, ECSA, CEH
 
Critical System Specification in Software Engineering SE17
koolkampus
 
www.ijerd.com
IJERD Editor
 
SA Chapter 7
Nuth Otanasap
 
PACE-IT: Common Threats (part 1)
Pace IT at Edmonds Community College
 
SA Chapter 2
Nuth Otanasap
 

Viewers also liked (20)

PPT
Ch06 system administration
Raja Waseem Akhtar
 
PPT
Ramadan 2008
Raja Waseem Akhtar
 
PPT
Ch21 system administration
Raja Waseem Akhtar
 
PPT
Ch23 system administration
Raja Waseem Akhtar
 
PPT
Ch09 system administration
Raja Waseem Akhtar
 
PPT
Ch18 system administration
Raja Waseem Akhtar
 
PPT
Ch11 system administration
Raja Waseem Akhtar
 
PPT
Ch08 system administration
Raja Waseem Akhtar
 
PPT
Ch05 system administration
Raja Waseem Akhtar
 
PPT
Ch10 system administration
Raja Waseem Akhtar
 
PPT
Ch24 system administration
Raja Waseem Akhtar
 
PPT
Indiansoldiers
Raja Waseem Akhtar
 
PPT
Ch13 system administration
Raja Waseem Akhtar
 
PPT
Ch14 system administration
Raja Waseem Akhtar
 
PPT
Excel 2007 Unit P
Raja Waseem Akhtar
 
Ch06 system administration
Raja Waseem Akhtar
 
Ramadan 2008
Raja Waseem Akhtar
 
Ch21 system administration
Raja Waseem Akhtar
 
Ch23 system administration
Raja Waseem Akhtar
 
Ch09 system administration
Raja Waseem Akhtar
 
Ch18 system administration
Raja Waseem Akhtar
 
Ch11 system administration
Raja Waseem Akhtar
 
Ch08 system administration
Raja Waseem Akhtar
 
Ch05 system administration
Raja Waseem Akhtar
 
Ch10 system administration
Raja Waseem Akhtar
 
Ch24 system administration
Raja Waseem Akhtar
 
Indiansoldiers
Raja Waseem Akhtar
 
Ch13 system administration
Raja Waseem Akhtar
 
Ch14 system administration
Raja Waseem Akhtar
 
Excel 2007 Unit P
Raja Waseem Akhtar
 
Ad

Similar to Chapter15 -- implementing and managing networks (20)

PPTX
Software Engineering
JayaKamal
 
PPT
Lecture 7 Software Metrics.ppt
TalhaFarooqui12
 
PPTX
Project Scheduling
MSharmilaDeviITDEPT
 
PPT
Managing IT Projects
Rhys Leong
 
PPT
Is5540 course review
Asa Chan
 
PPT
Management Information system Session 4.ppt
ssuserd329601
 
PDF
System Development Life_IntroductionCycle.pdf
pncitechnologies
 
DOC
An Introduction to Project management(project management tutorials)
Daroko blog(www.professionalbloggertricks.com)
 
PDF
SE18_Lec 13_ Project Planning
Amr E. Mohamed
 
DOCX
Online auction system srs riport
Dilip Prajapati
 
DOCX
Online auction system srs riport
Dilip Prajapati
 
PPTX
System development lifecycle in grade 12
birenthapa1
 
PPS
Pmw2 k3ni 1-1a
hariclant1
 
DOCX
Current Resume
Michael Myers
 
PPT
Chapter 11 Metrics for process and projects.ppt
ssuser3f82c9
 
PPT
Lecture 2 introduction to Software Engineering 1
IIUI
 
PPT
overview of analysis, architecture and design process
csk selva
 
DOCX
PurposeThis course project is intended to assess your abilit
TakishaPeck109
 
DOCX
new ASE GROUPWORK.docx
ShangaviS2
 
PPTX
Design programing logic powor point.pptx
hailish4421ict
 
Software Engineering
JayaKamal
 
Lecture 7 Software Metrics.ppt
TalhaFarooqui12
 
Project Scheduling
MSharmilaDeviITDEPT
 
Managing IT Projects
Rhys Leong
 
Is5540 course review
Asa Chan
 
Management Information system Session 4.ppt
ssuserd329601
 
System Development Life_IntroductionCycle.pdf
pncitechnologies
 
An Introduction to Project management(project management tutorials)
Daroko blog(www.professionalbloggertricks.com)
 
SE18_Lec 13_ Project Planning
Amr E. Mohamed
 
Online auction system srs riport
Dilip Prajapati
 
Online auction system srs riport
Dilip Prajapati
 
System development lifecycle in grade 12
birenthapa1
 
Pmw2 k3ni 1-1a
hariclant1
 
Current Resume
Michael Myers
 
Chapter 11 Metrics for process and projects.ppt
ssuser3f82c9
 
Lecture 2 introduction to Software Engineering 1
IIUI
 
overview of analysis, architecture and design process
csk selva
 
PurposeThis course project is intended to assess your abilit
TakishaPeck109
 
new ASE GROUPWORK.docx
ShangaviS2
 
Design programing logic powor point.pptx
hailish4421ict
 
Ad

More from Raja Waseem Akhtar (20)

PPS
The prophet's wives
Raja Waseem Akhtar
 
PPS
God is Great
Raja Waseem Akhtar
 
PPS
Namaz ka tareeqa
Raja Waseem Akhtar
 
PPS
Aayat ul qursi
Raja Waseem Akhtar
 
PPS
2ªwwii how did it fought
Raja Waseem Akhtar
 
PPT
Fun with EMC2
Raja Waseem Akhtar
 
PPS
Jerusalm at night.pps
Raja Waseem Akhtar
 
PPS
From the sky
Raja Waseem Akhtar
 
PPS
Discover the discovery
Raja Waseem Akhtar
 
PPT
Solaris servers sec
Raja Waseem Akhtar
 
PPT
The OSI - seven layers
Raja Waseem Akhtar
 
PPT
Chapter16 - the internet and its tools
Raja Waseem Akhtar
 
PPT
Chapter12 -- troubleshooting networking problems
Raja Waseem Akhtar
 
PPT
Chapter11 -- networking with tcpip and the internet
Raja Waseem Akhtar
 
PPT
Chapter10 -- netware-based networking
Raja Waseem Akhtar
 
PPT
Chapter09 -- networking with unix and linux
Raja Waseem Akhtar
 
PPT
Chapter08 -- network operating systems and windows server 2003-based networking
Raja Waseem Akhtar
 
PPT
Chapter07 -- wa ns and remote connectivity
Raja Waseem Akhtar
 
PPT
Chapter06 -- topologies and access methods
Raja Waseem Akhtar
 
PPT
Chapter05 -- networking hardware
Raja Waseem Akhtar
 
The prophet's wives
Raja Waseem Akhtar
 
God is Great
Raja Waseem Akhtar
 
Namaz ka tareeqa
Raja Waseem Akhtar
 
Aayat ul qursi
Raja Waseem Akhtar
 
2ªwwii how did it fought
Raja Waseem Akhtar
 
Fun with EMC2
Raja Waseem Akhtar
 
Jerusalm at night.pps
Raja Waseem Akhtar
 
From the sky
Raja Waseem Akhtar
 
Discover the discovery
Raja Waseem Akhtar
 
Solaris servers sec
Raja Waseem Akhtar
 
The OSI - seven layers
Raja Waseem Akhtar
 
Chapter16 - the internet and its tools
Raja Waseem Akhtar
 
Chapter12 -- troubleshooting networking problems
Raja Waseem Akhtar
 
Chapter11 -- networking with tcpip and the internet
Raja Waseem Akhtar
 
Chapter10 -- netware-based networking
Raja Waseem Akhtar
 
Chapter09 -- networking with unix and linux
Raja Waseem Akhtar
 
Chapter08 -- network operating systems and windows server 2003-based networking
Raja Waseem Akhtar
 
Chapter07 -- wa ns and remote connectivity
Raja Waseem Akhtar
 
Chapter06 -- topologies and access methods
Raja Waseem Akhtar
 
Chapter05 -- networking hardware
Raja Waseem Akhtar
 

Recently uploaded (20)

PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
PDF
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
PDF
Apache CloudStack 201: Let's Design & Build an IaaS Cloud
ShapeBlue
 
PDF
Rethinking Security Operations - SOC Evolution Journey.pdf
Haris Chughtai
 
PPTX
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
PPTX
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
PDF
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
PPTX
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
PPTX
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
PDF
TrustArc Webinar - Data Privacy Trends 2025: Mid-Year Insights & Program Stra...
TrustArc
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PDF
July Patch Tuesday
Ivanti
 
PDF
CloudStack GPU Integration - Rohit Yadav
ShapeBlue
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PDF
Building Resilience with Digital Twins : Lessons from Korea
SANGHEE SHIN
 
PDF
Wojciech Ciemski for Top Cyber News MAGAZINE. June 2025
Dr. Ludmila Morozova-Buss
 
PPTX
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
Apache CloudStack 201: Let's Design & Build an IaaS Cloud
ShapeBlue
 
Rethinking Security Operations - SOC Evolution Journey.pdf
Haris Chughtai
 
Building a Production-Ready Barts Health Secure Data Environment Tooling, Acc...
Barts Health
 
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
TrustArc Webinar - Data Privacy Trends 2025: Mid-Year Insights & Program Stra...
TrustArc
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
July Patch Tuesday
Ivanti
 
CloudStack GPU Integration - Rohit Yadav
ShapeBlue
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
Building Resilience with Digital Twins : Lessons from Korea
SANGHEE SHIN
 
Wojciech Ciemski for Top Cyber News MAGAZINE. June 2025
Dr. Ludmila Morozova-Buss
 
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 

Chapter15 -- implementing and managing networks

  • 1. Chapter 15: Implementing and Managing Networks Network+ Guide to Networks
  • 2. Objectives Describe the elements and benefits of project management Manage a network implementation project Understand network management and the importance of base lining to assess a network’s health
  • 3. Objectives (continued) Plan and follow regular hardware and software maintenance routines Describe the steps involved in upgrading network software and hardware
  • 4. Project Management Project Management Is the practice of managing resources, staff, budget, timelines, and other variables to achieve a specific goal within given bounds Project management attempts to answer at least the following questions in roughly the following order: Is the proposed project feasible? What needs must the project address?
  • 5. Project Management (continued) What are the project’s goals? (What are the standards for success?) What tasks are required to meet the goals? How long should tasks take, and in what order should they be undertaken? What resources are required to accomplish the tasks, and how much will they cost?
  • 6. Project Management (continued) Who will be involved and what skills must they possess? How will staff communicate with others about the project? After completion, did the project meet the stated need? A project can be divided into four phases
  • 8. Determining Project Feasibility Before committing money and time to a project, you must decide whether the proposed project is possible and whether it’s feasible Feasibility study outlines the costs and benefits of the project and attempts to predict whether it will result in a favorable outcome
  • 9. Determining Project Feasibility (continued) Feasibility study might consist of rough estimates for the following: Costs of equipment, connectivity, consulting services Required staff time for project participation, training, and evaluation
  • 10. Duration of project Decrease in productivity due to disruption versus increase in future productivity due to better network and client performance A conclusion that addresses whether the costs (equipment, staff, decreased productivity) justify the benefits (increased ongoing productivity) Determining Project Feasibility (continued)
  • 11. Determining Project Feasibility (continued) Often, organizations hire business consultants to help them develop a feasibility study Advantage to outsourcing this work is that consultants do not make the same assumptions that internal staff might make when weighing the costs and benefits of a proposed project
  • 12. Assessing Needs Needs assessment is the process of clarifying the reasons and objectives underlying a proposed change Involves interviewing users and comparing perceptions to factual data May involve analyzing network baseline data
  • 13. Assessing Needs (continued) A needs assessment may address the following questions: Is the expressed need valid, or does it mask a different need? Can the need be resolved?
  • 14. Assessing Needs (continued) Is the need important enough to allocate resources to its resolution? Will Meeting the need have a measurable effect on productivity?
  • 15. Assessing Needs (continued) If fulfilled, will the need result in additional needs? Will fulfilling the need satisfy other needs? Do users affected by the need agree that change is a good answer? What kind of resolution will satisfy them?
  • 16. Assessing Needs (continued) A network’s needs and requirements should be investigated as they relate to: Users Network performance
  • 17. Assessing Needs (continued) Availability Scalability Integration Security
  • 18. Setting Project Goals Project goals help keep a project on track Evaluating whether a project was successful A popular technique for setting project goals is to begin with a broad goal, then narrow it down into specific goals that contribute to the larger goal Project goals should be attainable
  • 19. Setting Project Goals (continued) Feasibility study should help determine whether you can achieve the project goals within the given time, budgetary, and resource constraints
  • 20. Setting Project Goals (continued) If project goals are not attainable from the outset, you risk losing backing from project participants, users, and the managers who agree with the project’s goals and who will strive to help you achieve them
  • 21. Setting Project Goals (continued) Managers and others who oversee resource allocation are called sponsors
  • 22. Project Planning Project plan organizes the details of a managed project Small projects may take the form of a simple text or spreadsheet document
  • 23. Project Planning (continued) Larger projects, however, you typically take advantage of project management software such as Microsoft Project or PrimaVera Project Planner Project management software facilitates project planning by providing a framework for inputting tasks, timelines, resource assignments (identifying which staff are responsible for each task), completion dates, and so on
  • 25. Tasks and Timelines Project should be divided into specific tasks Break larger tasks into smaller subtasks Identify tasks, you can assign a duration, start date, and finish date to each task and subtask in the project plan
  • 26. Tasks and Timelines (continued) Designate milestones, task priority, and how the timeline might change depending on resource availability or dependencies A Gantt chart is a popular method for depicting when projects begin and end along a horizontal timeline
  • 27. Tasks and Timelines (continued)
  • 28. Communication Communication is necessary to ensure that all participants understand the project’s goals It helps keep a project’s budget and timeline on track, encourage teamwork, avoid duplicate efforts, and allows learning from previous mistakes
  • 29. Communication (continued) Project manager is responsible for facilitating regular, effective communication among project participants Project managers must ensure consistent communication with all project stakeholders
  • 30. Communication (continued) A stakeholder is any person who is affected by the project; for example, in the Wyndham School District upgrade project, stakeholders include: Teachers Administrators Technical staff Students, because students are also network users
  • 31. Contingency Planning Unforeseen circumstances Contingency planning Pilot Network The following tips will help you create a more realistic and useful pilot network:
  • 32. Include at least one of each type of device (whether a critical router or a client workstation) that might be affected by the change Use the same transmission methods and speeds as employed on your network Contingency Planning (continued)
  • 33. Try to emulate the number of segments, protocols, and addressing schemes in your network. Implement the same server and client software and configurations on your pilot network as found in your current network (unless they are part of the change you’re testing) Contingency Planning (continued)
  • 34. Once you have established the pilot network Test it for at least two weeks to verify that its performance, security, availability, or other characteristics meet your criteria Contingency Planning (continued)
  • 35. Network Management Network management refers to the assessment, monitoring, and maintenance of all aspects of a network Baselining is the practice of measuring and recording a network’s current state of operation
  • 37. Baseline assessment should address the following questions: Access method Protocols Devices Operating systems Applications
  • 38. Performance and Fault Management Performance management (monitoring how well links and devices are keeping up with the demands placed on them) Fault management (the detection and signaling of device, link, or component faults)
  • 39. Performance and Fault Management (continued) To accomplish both performance and fault management, organizations often use enterprise-wide network management software Polling Network management agent
  • 40. Performance and Fault Management (continued) Management information base (MIB) by definition are where managed objects and their data are collected Agents communicate information about managed objects via any one of several Application layer protocols
  • 41. Performance and Fault Management (continued) Once data is collected, the network management program can present an administrator with several ways to view and analyze the data
  • 44. Network Management (continued) One of the most common network management tools used on WANs is the Multi Router Traffic Grapher (MRTG) MRTG is a command-line program that uses SNMP to poll devices, collects data in a log file, then generates HTML-based views of the data
  • 45. Network Management (continued) MRTG is freely distributed software originally written by Tobias Oetiker MRTG can be used with UNIX- and Windows-based operating systems and can collect and graph data from any type of device that uses SNMP
  • 47. Asset Management A key component in network evaluation is identifying and tracking the hardware and software on your network, a process called asset management Asset management is to take an inventory of each node on the network
  • 48. Asset Management (continued) Inventory should include the total number of components on the network, and also each device’s configuration files, model number, serial number, location on the network, and technical support contact
  • 49. Software Changes 1. Determine whether the change (whether it be a patch, revision, or upgrade) is necessary 2. Research the purpose of the change and its potential effects on other programs 3. Determine whether the change should apply to some or all users and whether it will be distributed centrally or machine-by-machine
  • 50. Software Changes (continued) 4. If you decide to implement the change, notify system administrators, help desk personnel, and users. Schedule the change for completion during off hours (unless it is an emergency) 5. Back up the current system or software before making any modifications
  • 51. Software Changes (continued) 6. Prevent users from accessing the system or part of the system being altered (for example, disable logons) 7. Keep the upgrade instructions handy and follow them during installation of the patch or revision 8. Make the change
  • 52. Software Changes (continued) 9. Test the system fully after the change 10. If the change was successful, reenable access to the system and if it was unsuccessful, revert to the previous version of the software
  • 53. Software Changes (continued) 11. Inform system administrators, help desk personnel, and users when the change is complete. If you had to reverse it, explain why 12. Record your change in the change management system.
  • 54. Patches A general rule, upgrading or patching software according to a vendor’s recommendations is a good idea and can often prevent network problems
  • 55. Patches (continued) Patches is a correction, improvement, or enhancement to a particular piece of a software program Differs from a revision or software upgrade in that it changes only part of a software program, leaving most of the code untouched Are often distributed at no charge by software vendors in an attempt to fix a bug in their code or to add slightly more functionality
  • 56. Client Upgrades Software upgrade is a major change to a software package’s existing code An upgrade to the client program replaces the existing client program
  • 57. Client Upgrades (continued) Upgrades are designed to add functionality and fix bugs in the previous version of the client A client upgrade may be transparent to users, or it may completely change the appearance of the network logon interface
  • 58. Application Upgrades Application upgrades, apply to software shared by clients on the network Back up the current software before upgrading it
  • 59. Application Upgrades (continued) Prevent users from accessing the software during the implementation Keep users and system administrators informed of all changes.
  • 60. Network Operating System Upgrades Most Critical Involves significant, potentially drastic, changes to the way your servers and clients operate Have a project plan covering the upgrade procedure
  • 61. Network Operating System Upgrades (continued) How will the upgrade affect user IDs, groups, rights, and policies? How will the upgrade affect file, printer, and directory access, applications or client interactions on the server?
  • 62. Network Operating System Upgrades (continued) How will the upgrade affect configuration files, protocols, and services running on the server? How will the upgrade affect the server’s interaction with other devices on the network?
  • 63. Network Operating System Upgrades (continued) How accurately can you test the upgrade software in a simulated environment? How can you take advantage of the new operating system to make your system more efficient?
  • 64. Network Operating System Upgrades (continued) What is your technical support arrangement with the operating system’s manufacturer if you need help in the midst of the upgrade? Have you allotted enough time to perform the upgrade? (For example, would it be more appropriate to do it over a weekend rather than overnight?)
  • 65. Network Operating System Upgrades (continued) Have you ensured that the users, help desk personnel, and system administrators Understand how the upgrade will affect their daily operations and support burdens?
  • 66. Network Operating System Upgrades (continued) The following steps demonstrate how careful planning and a methodical process can help you accomplish an NOS upgrade Research Proposal Evaluation Training
  • 67. Network Operating System Upgrades (continued) Pre-implementation Implementation Post-implementation
  • 69. Hardware and Physical Plant Changes Determine whether the change is necessary Research the upgrade’s potential effects on other devices, functions, and users Notify system administrators, help desk personnel, and users, and schedule it during off-hours (unless it is an emergency)
  • 70. Hardware and Physical Plant Changes (continued) Back up and print the hardware’s configuration Prevent users from accessing the system or the part of the system that you are changing
  • 71. Hardware and Physical Plant Changes (continued) Keep the installation instructions and hardware documentation handy Implement the change and test the hardware fully If the change was successful, re-enable access to the device and If it was unsuccessful, isolate the device or reinsert the old device, if possible
  • 72. Hardware and Physical Plant Changes (continued) Inform system administrators, help desk personnel, and users when the change is complete. If it was not successful, explain why Record your change in the change management system
  • 73. Adding or Upgrading Equipment Networked workstation is the simplest device to add Networked printer is easy to add to your network and is slightly more complex than adding a networked workstation HUB (4-64 users)
  • 74. Adding or Upgrading Equipment Servers are more complex and need a great deal of prior planning Switches and Routers are more complex
  • 75. Adding or Upgrading Equipment (continued) Cabling upgrades may require significant planning and time to implement, depending on the size of your network Backbone upgrade is the most comprehensive and complex upgrade involving a network
  • 76. Adding or Upgrading Equipment (continued) Reversing Hardware Changes Provide a way to reverse the hardware upgrade and reinstall the old hardware if necessary
  • 77. Summary Describe the elements and benefits of project management Manage a network implementation project Base-lining to assess a network’s health
  • 78. Summary (continued) Hardware and software maintenance routines Steps involved in upgrading network software and hardware