Can you help me with summarizing this chapter? I just need around 350 words and
ID: 3917624 • Letter: C
Question
Can you help me with summarizing this chapter? I just need around 350 words and all I need is to grasp its main points and the summary does not have to be particularly polished. Thank you!
11. Whene ane your demarcation points? How an they documeed and labeled? RFC numbers for those poteccote? An any of them propri tary protocols? if 13. Devise a plan or doploying IPvs at your company Inciading how you will 14. Why haven't yoa approached managemene yes aborat deplaying IP67 I you 12. Which pros doyoa use on yournework, and what are Chapter 24 Network Operations so, how “uld you avoid using th protocols? have but didn't sucaxed, why do you ink tha is, and how could you do All IT wrvles nely on the network lf the nework ils,so doeseverything thas is conced toi, andeverything tha relies on those deviaes and so on.A solid nes- work design helps you to build aiabe network, but youonly so ar Onae the retwork has bean built, it xds o be operated, mainained, and un in away that ensures i is highy abiand availableThis chaper describes best practiaas for monitoring, managing, and suppoing an enterprise nework, including oc- mmndaon for oois and oraniztional seuceares so facilitae supporing the network, pardicularty in large eerprises Incrasing numbers and types of devices are becoming IRenabled Corpora ekphones, baiding acess, and eority sysems ed so have para wiring and on-IP prutocolsNow no company woald consider buying a soludonhat does not cE to les IP neework Other sysems such as ghting, which noe previoy par of any nxworkthe building power grid, are gong in the same direction. Smart ightigscoenient saves energy, and can even be used to enhance sakks in stones and poroduchity in offiaes It will rapidly become the norm. Other things that we never previouty crEmpaed connecting 40 the network will Sllow suo, and as thay do, network iabily will become eve mon critical than i Poople ofen the sl when talkingabous highly reliable and ?ailable sríæs. However, stabiliry implks a lack ofchang, with the implication that lf we don't make changes so the neework, or make changes only occasional y the nework will be more mliable. However, we advoczes that you also increas he mabey of your etwork by ngthe small basches principe (Chapeer 2 by undeiaking rigceuus esing and by treaning your nework devices as cattk rather than pees(Chapers 3 and 4) Nowork operations stares with monieing Monioring provides visibility hat dliaes al other you ax mot monsoeing your neework,you antproviding a a. You won't know at you have a prubiem untl someone mpors it, and yoa aer ainly won't be able to prevent the probiem from happening. Monisoring sa basic quiremene of amy service.These are the minimal isms that shoald be monitored be appled so how nexwork dav laes a managed. In addieion, we shorald seive to manage he nework contiguration as version-conroed code. 24.2.1 A ccess and Audit Trail Amy changs that an made so neework dvlaes noed to genera an audit trail that enables one so traae the changg back to a person. Atodlt trails an a regaa- try mquitemene for many busineses, andexinemely aseful for all bi.The audit logs should be sent off the device toa ænnited logging eri revent oelaeion and subequene view as and when they a roquired das PCI Nework d"i08 (turs and switches, notendpores Hah (up/down sanus) Intemal componenes (ades, saves, extensions) Resoura uilizaion (mmory, CFU, and so on) As with amy SA asks, changing the connguraelon of ework dvlaes is not somehing that ju anyone should be able to da A mistal? in the network an guration can have wIdesproadpacs on hecompamy. W acs Te ork dlaes should be rseriond to asmal team of peape who work closly togother For each WAN link, LAN runk plus the individal links hat make up a Heah (up/down stanus) -Utilization (how much apadey is in u and who undersand thesie archisecu network devias should be thromindividraal accounts, rather than rough tuk accouns, so that such acnss is lognd to a parscalar ue.Acess pruvisoning and Sume of what you mortar is usd?desct and idemety semicdmpacing prub. ems. Honeer, so provide a higy rellable and availabie nenwoek, you muse also dec and identfy problems that ane noyes sevian-impacing, and use the infor- ancallad aathorization and On-device authedion daabess should be used Hor movery cdentas only ation oprvent them um beingvian-Impacing or to deec anomalks hatmay be indicative of anoherprubiem. Inother words you noed oderawhen a sysiem is sick, so i can be ted bo it dies andnegatey impacs uwers 24.2.2 Life Cycle mR lik yck2 of a dv ?? is the rks of skages it goes through between bing purchased and ulmaely disposed of. The cycle of neework davles is consid crably different than the one described for worksations in Chaper7,"Worksation Forexampk, hawing n of a number of redundae links down does no causa sr ?? impace, but desoing it and txhing it In a timely manner can pavene a elae impac. Similarty, ework wilizaeon should be und to prdia when more bandwidth will be?quired, so that it can be provisioned before lack of bandwidth caases service impacs. This type of monitoring can also be d deasadden, unex pechod increases or decreaes in traffic, which may Indicatea The -cyck phas for neework devices can be described as in stock assigned, installed, depluying, aperaeional, servicing decommissioning and dis posod. The -cyck stan shoald be racked in the Invenory syseem 24.2 Management ework manment is ofsen conilaned wih monitoring, but thay an mally WO entrely sparas thing. Monitoringobes the current seane of the neework and helps you odoc,predice, and prevent problems. Managee me ans controlling Dependngon the type of deviae and the -cycl phas tha it is in, dient kvels of change conerol are appropriae. The guiding principe is that change man- gemee is aedod when e change affeces the prodaceion eework. For exampk w nework equipment that is bengdoped eds to be and as production equipment?son as is partidpating lim routing wish production systems, or passing erafnic acs the production network eework eq pment differs frum servers in how it becomes Ie. A serer insaltied, conngured, and uning but it is noe taty in prodracion tanil prodaction traftic direcd at it Dxpanding on the erve, may be broghe into prodaction by making a chang econtgcration and imware versions can be fully deployed, wlth all the Network management tools have lagged behind the corespondingoostha are adity ? allat inr managing workaltions and seners, largely bause net- work dvles ofen run pooprieary hardware and softw are thae is no conduche o developing open source soons. However, jas as Chaper 3, "Rets and Cn ,ecommends aring evers as cantk, o pets, the same philcesopthry should in a load balancer,or in With n equipment,?soon as its fully configured and “nneod tn the network, it is anExplanation / Answer
Network operations starts with monitoring,Monitoring provides the visibility that facilitates all other operational tasks.Network management is often conflated with monitoring but they are really entirely two separate things.Monitoring observes the current state of the network and helps you to detect , predict and prevent problems .Management means controlling device configuration and firmware versions.Ausit trails are regulatory requirements for many business and extremely useful for all business .The lifecycle phases for a network are in stock,assigned ,installed,deploying ,operational servicing,and disposed .
Configuration management for network devices lags behind what is being done with work stations and severs .
Hope this will help
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.