0% found this document useful (0 votes)
19 views30 pages

Chapter 4 Network Management

Network Management Network Services TCP/IP Troubleshooting Commands Remote administration

Uploaded by

behaylu tadele
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views30 pages

Chapter 4 Network Management

Network Management Network Services TCP/IP Troubleshooting Commands Remote administration

Uploaded by

behaylu tadele
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 30

CHAPTER FOUR

Network
Management
CONTENTS
Network Management
Configuring our network
Network Services
TCP/IP Troubleshooting Commands
Remote administration
WHAT IS NETWORK MANAGEMENT?

Network: autonomous system of 100s, 1000s or 10000s interacting hardware/software


components.

Management: accomplishing goals and objectives, efficiently and effectively

network management is about:

❍ configuration of the network

❍ monitoring equipment performance

❍ monitoring network traffic

❍ meeting business goals: eg partitioning of users

❍ dealing with issues – equipment failure, overload, malicious attacks, …


A NETWORK MANAGEMENT SYSTEM (NMS)

It refers to a collection of applications that enable network components to be


monitored and controlled.
NETWORK MANAGEMENT FUNCTIONS

has grouped the management functions into five areas:

(i) configuration management

(ii) fault management

(iii) accounting management

(iv) security management

(v) performance management.


CONFIGURATION MANAGEMENT

It is concerned with initializing a network, provisioning the network


re-sources and services, and monitoring and controlling the network.

It consists of both device configuration and network configuration.

Device configuration can be performed either locally or remotely.


Automated network configuration, such as :
Dynamic Host Configuration Protocol (DHCP) and
Domain Name Services (DNS)
When an IP-based local area network is installed, each
computer must be configured with an IP address.
If the computers need to access the Internet, they should also
be configured with a gateway address and one or more DNS
server addresses.
Dynamic Host Configuration Protocol (DHCP)
Used to automatically obtain the configuration information. A device
on the network may act as a DHCP server.
The DHCP server stores a list or pool of IP addresses, along with
other information (such as subnetmask, gateway and DNS
addresses) that it may assign to the other devices on the network.
Domain Name Systems (DNS) is mechanisms that assign easy to
remember names to IP address.

Allows you to translate domain names automatically to Ip address on


the Internet.
A key element of the DNS is a worldwide collection of DNS servers.

Domains have been made on the base of organization type or


geographical locations, e.g., the domain name google.com (where,
com indicates that Google is a commercial organization).
FAULT MANAGEMENT
It involves detection, isolation, and correction of abnormal operations
that may cause the failure of the OSI network.

The major goal is to ensure that the network is always available and
when a fault occurs, it can be fixed as rapidly as possible.

Faults should be distinct from errors. An error is generally a single


event, whereas a fault is an abnormal condition that requires management
attention to fix.
SECURITY MANAGEMENT

Protects the networks and systems from unauthorized access and security
attacks.

The mechanisms for security management include


Authentication

Encryption

authorization.

It concerned with generation, distribution, and storage of encryption keys


as well as other security-related information.
ACCOUNTING MANAGEMENT

It enables charge for the use of managed objects to be


measured and the cost for such use to be determined.

The measure may include :


the resources consumed

the facilities used to collect accounting data

set billing parameters for the services used by customers

The maintenance of the databases used for billing purposes

the preparation of resource usage and billing reports.


PERFORMANCE MANAGEMENT

It is concerned with evaluating and reporting the


behavior and the effectiveness of the managed network
objects.

A network monitoring system can measure and display


the status of the network, such as gathering the statistical
information on traffic volume, network availability,
response times.
NETWORK MANAGEMENT PROTOCOLS

FTP (File Transfer Protocol) allows the transfer of collection of files between
two machines connected to the Internet.

Telnet (Terminal Protocol) allows a user to connect to a remote host in


terminal mode.

SMTP (Simple Mail Transfer Protocol) defines a basic service for electronic
mails.

SNMP (Simple Network Management Protocol) allows the management of


the network. Gather performance data (CPU usage, bandwidth, errors, uptime,
receive alerts etc.) from devices like routers, switches, servers, firewalls, and
printers.
CONFIGURING A LINUX BOX FOR NETWORKING

To communicate on a modern TCP/IP network every computer needs


compatible IP address for that network.
The IP address is composed of two portions-the network id and host id.
The network id must be the same and the host id must be unique on each
TCP/IP subnet.
The IP address can be obtained either statically or dynamically. The
interfaces are: eth0, enp3s0 → Wired
wlan0, wlp2s0 → Wireless
lo → Loopback
DHCP exists on networks to allow linux obtain compatible ips to
communicate on TCP/IP networks.

A Linux Box is a desktop, server, virtual machine, or even an embedded device that
runs the Linux operating system
CONFIGURE A LINUX SYSTEM AS A ROUTER

Router is a special device that not only provides the IP forwarding as the
main function but also supports several other IP based features such as;
packet filtering, voice over IP, IP firewall, routing etc.

It is an expensive device. Configuring it is also a complex task.

Linux provides a zero-cost solution for the IP forwarding. If you have a


Linux system in your network, you can use it for the IP forwarding.
CONFIGURING A WEB SERVER (APACHE)

Apache is currently the most widely used web server in the world. It is an
open-source software.
Apache prefer for its speed, security, reliability, robustness, and ease of
customization.
It is able to meet the needs of many environments as it allows the
installation of various extensions and modules.
It is responsible for accepting directory requests from Internet users and
sending them their desired information in the form of files.
If your server doesn’t already have Apache, you can easily install it using
one command. #sudo apt-get update
#sudo apt-get install apache2
What is Web Server?

Web servers are used to serve Web pages requested by client


computers.

Clients typically request and view Web pages using Web


browser applications such as Firefox, Opera, Chromium, or
Internet Explorer.
CONFIGURING A DOMAIN NAME SERVICE (DNS)

Domain Name Service (DNS) is an Internet service that maps IP


addresses and fully qualified domain names (FQDN) to one another.

In this way, DNS improves the need to remember IP addresses.

Computers that run DNS are called name servers.

Ubuntu ships with BIND (Berkley Internet Naming Daemon), the most
common program used for maintaining a name server on Linux.

A FQDN includes
Hostname – The specific machine or service (e.g., www, mail, ftp).

Domain name – The registered domain (e.g., example).

Top-Level Domain (TLD) – The domain extension (e.g., .com, .org, .edu).

Root (.) – The DNS root (often omitted when written).


INSTALL AND CONFIGURE BIND

1. Install BIND9 on Ubuntu: #sudo apt update


#sudo apt install bind9 bind9utils bind9-doc -y
2. Check if the Service is Running: #sudo systemctl status bind9
replace status with start and enable to start and enable the service
3. Configure a Forward Lookup Zone: #sudo nano /etc/bind/named.conf.local
4. Create the Zone File: #sudo cp /etc/bind/db.local /etc/bind/db.example.com
#sudo nano /etc/bind/db.example.com
5. Configure Reverse Lookup Zone (Optional): #sudo nano
/etc/bind/named.conf.local
6. Check Configuration: #sudo named-checkconf
#sudo named-checkzone example.com /etc/bind/db.example.com
#sudo named-checkzone 1.168.192.in-addr.arpa /etc/bind/db.192
7. Restart BIND: #sudo systemctl restart bind9
8. Test the DNS Server: #dig @192.168.1.10 example.com
#dig @192.168.1.10 www.example.com
CONFIGURING MAIL TRANSFER AGENTS (POSTFIX)

The mail server that is also known as Mail Transfer Agent is responsible
for transferring email from server to server on the internet, while mail
client performs the activities of retrieving these emails.

Postfix is a popular open-source Mail Transfer Agent (MTA) that can


be used to route and deliver email on a Linux system.

It is estimated that around 25% of public mail servers on the internet run
Postfix.

Postfix is a default package in the Ubuntu repositories, we can install it


easily by using the ‘apt-get’ command.

#sudo apt-get update #sudo apt-get install postfix


CONFIGURING A PROXY CACHES (SQUID)

Squid is a caching proxy for the web. It is a great proxy server


mainly used for caching frequently requested web content in order
to speed up response time and also save network bandwidth.
Squid optimizes the data flow between client and server to
improve performance and caches frequently used content to save
bandwidth.
Acts as a firewall or filter to block harmful sites or content.
The squid proxy server acts as an intermediate between the client
(web browsers, etc.) and the internet. Installation Commands are:
#sudo apt update
#sudo apt install squid -y
TCP/IP TROUBLESHOOTING
The TCP/IP describes a set of general design guidelines and
implementations of specific networking protocols to enable computers to
communicate over a network.

TCP/IP provides end-to-end connectivity specifying how data should be


formatted, addressed, transmitted, routed and received at the destination.

Linux and other Unix operating systems use the TCP/IP protocol.

There are troubleshooting guide can help you resolve wireless network
(Wi-Fi) issues for systems with the Ubuntu Linux Operating System (OS).
TROUBLESHOOTING COMMANDS
1. ping: Tests connectivity between your computer and
another host (IP or domain). It sends ICMP Echo Request
packets and waits for Echo Reply. Exa ping 8.8.8.8
2. traceroute / tracert: Shows the path packets take to
reach a destination, hop by hop. Eg. traceroute
google.com
3. ifconfig / ipconfig: Displays and configures network
interfaces (Linux). Shows IP addresses, MAC addresses,
and interface.
4. netstat: Shows active network connections, routing
tables, interface stats. Example: netstat -tulnp
NETWORK CONFIGURATION

Refers to the process of setting up and managing the settings and


parameters of a computer network. It involves tasks such as
assigning IP addresses,

configuring routers and switches,

 enabling network protocols, and

establishing network security measures.

 Proper network configuration ensures that devices within the network


can communicate effectively and securely.
NETWORK SERVICES

Refer to the various technologies, protocols, and applications that enable

communication and connectivity within computer networks. Some common

network services include:

DNS (Domain Name System): Translates domain names into IP addresses to

facilitate web browsing and other network communication.

DHCP (Dynamic Host Configuration Protocol): Assigns IP addresses

dynamically to devices on a network, simplifying network configuration.

NAT (Network Address Translation): Translates private IP addresses to public

IP addresses, allowing multiple devices to share a single public IP address.

Firewall: Provides security by monitoring and controlling network traffic,

protecting against unauthorized access and potential threats.


CONT..

VPN (Virtual Private Network): Creates a secure and encrypted connection


over a public network, enabling remote access and ensuring privacy.
Proxy Server: Acts as an intermediary between client devices and the
internet, improving performance, caching content, and enhancing security.
Email Services: Include protocols such as SMTP (Simple Mail Transfer
Protocol) for sending emails and POP3/IMAP (Post Office Protocol/Internet
Message Access Protocol) for receiving emails.
File Transfer Protocol (FTP): Allows the transfer of files between computers
on a network, commonly used for website hosting and file sharing.
VoIP (Voice over Internet Protocol): Transmits voice communications over
IP networks, enabling voice and video calls over the internet.
NETWORK TIME SERVICES (NTP)

Network Time Services (NTP): NTP is a protocol used to synchronize the clocks of
computers on a network.
It ensures that all devices have the correct time, which is essential for various network
activities and applications.
NTP servers distribute accurate time information, while client devices synchronize
their clocks with these servers to maintain accurate timekeeping.

Virtual Network Computing (VNC): VNC is a remote desktop sharing system that
allows you to view and control a remote computer's desktop environment over a network
connection.
 It enables you to interact with a remote computer as if you were physically present at
its location.
VNC consists of a server component running on the remote computer and a client
component running on the local machine.
RPC-Based Services: RPC (Remote Procedure Call) is a

protocol that allows a program on one computer to call a

procedure on another computer without worrying about the

underlying network details.

 RPC-based services are services that use RPC to

communicate between different systems or processes.


CONFIGURATION, TELNET REPLACEMENT, SECURE
COPY AND RSYNC (REMOTE SYNC)

1. Configuration: Configuration refers to the process of setting up and


adjusting the settings of a system, device, or software to meet specific
requirements or preferences.

2. Telnet Replacement: Telnet is a protocol used for remote terminal


connections, but it is considered insecure due to its lack of encryption.
Secure alternatives to Telnet, such as SSH (Secure Shell) .

3. Secure Copy (SCP): is a secure file transfer protocol. It is based on


SSH and uses encryption to protect data during transmission.

4. Rsync (Remote sync): is a utility used for efficient file synchronization


and transfer between systems.
It is particularly useful for synchronizing files and directories between
a local and a remote system over a network.
Thank You!

You might also like