Planning and Installing Network

Preview:

Citation preview

Confidential

Network+

Planning and Installing Networks

2Confidential

Objectives

Describe the elements and benefits of project management

Manage a network implementation project

Understand network management and the importance of baselining

to assess a network’s health

Plan and follow regular hardware and software maintenance

routines

Describe the steps involved in upgrading network hardware and

software

3Confidential

Project Management

Managing staff, budget, timelines, and other resources and

variables to achieve specific goal within given bounds

Attempts to answer at least following questions:

Is proposed project feasible?

What needs must project address?

What are project’s goals?

What tasks are required to meet goals?

How long should tasks take, and in what order should they be

undertaken?

4Confidential

Project Management (continued)

Attempts to answer at least the following questions (continued):

What resources are required, and how much will they cost?

Who will be involved and what skills are needed?

How will staff communicate?

After completion, did project meet stated need?

Most projects divided into phases

Milestone: reference point marking completion of major task or

group of tasks in project

5Confidential

Project Management (continued)

Figure : Project phases

6Confidential

Determining Project Feasibility

Feasibility study outlines costs and benefits of project

Attempts to predict whether it will yield favorable outcome

Should be performed for any large-scale project before resources

committed

7Confidential

Assessing Needs

Needs assessment: process of clarifying reasons and objectives

underlying proposed change(s)

Interviewing users

Comparing perceptions to factual data

Analyzing network baseline data

8Confidential

Assessing Needs (continued)

Needs assessment may address the following:

Is expressed need valid or does it mask a different need?

Can need be resolved?

Is need important enough to allocate resources to its resolution? Will

meeting it have measurable effect on productivity?

If fulfilled, will need result in additional needs? Will fulfilling it satisfy

other needs?

Do users affected by the need agree that change is a good answer?

What kind of resolution will satisfy them?

9Confidential

Setting Project Goals

Project goals help keep project on track

Necessary when evaluating whether project was successful

Popular technique is to begin with broad goal, narrow down to

specific sub-goals

Project goals should be attainable

Feasibility study helps determine attainability

Sponsors: managers and others who oversee resource allocation

Stakeholder: any person affected by the project

10Confidential

Project Planning

Project plan: organizes details of a project

e.g., timeline and significant tasks

May use text or spreadsheet documents for small projects

For large projects, use project management software

Provides framework for inputting tasks, timelines, resource assignments,

completion dates, and so on

11Confidential

Project Planning (continued)

Figure : A project plan in Microsoft Project

12Confidential

Tasks and Timelines

Project should be divided into specific tasks

Divide large tasks into sub-tasks

Assign duration, start date, finish date to each task and sub-task

Designate milestones, task priority, and how timeline might change

Allow extra time for significant tasks

Gantt chart: popular method for depicting when projects begin and

end along a horizontal timeline

13Confidential

Tasks and Timelines (continued)

Figure : A simple Gantt chart

14Confidential

Communication

Project manager responsible for facilitating regular, effective

communication among project participants

Must communicate with stakeholders as well

Must prepare users for changes:

How access to network will be affected

How data will be protected during change(s)

Whether you will provide means for users to access the network during

change(s)

Whether users will have to learn new skills

15Confidential

Contingency Planning

Even meticulously planned projects may be derailed by unforeseen

circumstances

Contingency planning: process of identifying steps that minimize risk

of unforeseen events that could affect quality or timeliness of

project’s goals

16Confidential

Using a Pilot Network

Pilot network: small-scale network that stands in for a larger network Used to test changes before applying to enterprise Should be similar enough to closely mimic larger network’s hardware,

software, connectivity, unique configurations, and load Tips for creating realistic and useful pilot network:

Include at least one of each type of device that might be affected by the change

Use same transmission methods and speeds as employed on your network

17Confidential

Using a Pilot Network (continued)

Tips for creating realistic and useful pilot network (continued):

Try to emulate number of segments, protocols, and addressing

schemes in current network

Try to generate similar amount of traffic

Implement same server and client software and configurations as found

in current network

Test for at least 2 weeks

18Confidential

Testing and Evaluation

Test after completing each major step

Must establish testing plan

Including relevant methods and criteria

Testing should reveal:

Whether task was successful

Unintended consequences

Whether new needs exposed

19Confidential

Network Management

In broad terms, assessment, monitoring, and maintenance of all aspects of a network

Network management applications may be used on large networks Continually check devices and connections to ensure they respond

within expected performance threshold May not be economically feasible on small network

Several disciplines fall under heading of network management All share goal of preventing costly downtime or loss

20Confidential

Obtaining Baseline Measurements

Baseline: report of network’s current state of operation

Baseline measurements allow comparison of future performance

increases or decreases caused by network changes with past network

performance

The more data gathered while establishing the baseline, the more

accurate predictions will be

Several software applications can perform baselining

21Confidential

Obtaining Baseline Measurements (continued)

Figure : Baseline of daily network traffic

22Confidential

Obtaining Baseline Measurements (continued)

Baseline assessment should address:

Physical topology

Access method

Protocols

Devices

OSs

Applications

23Confidential

Performance and Fault Management

Performance management: monitoring how well links and devices

are keeping up with demands

Fault management: detection and signaling of device, link, or

component faults

Organizations often use enterprise-wide network management

software

At least one network management console collects data from multiple

networked devices at regular intervals

Polling

24Confidential

Performance and Fault Management (continued)

Each managed device runs a network management agent

Collects information about device’s operation and provides it to network

management application

Definition of managed devices and data collected in a Management

Information Base (MIB)

Simple Network Management Protocol (SNMP): TCP/IP protocol

used by agents to communicate

25Confidential

Performance and Fault Management (continued)

Figure : Network management architecture

26Confidential

Performance and Fault Management (continued)

Network management application can present an administrator with

several ways to view and analyze data

Network management applications are challenging to configure and

fine-tune

Multi Router Traffic Grapher (MRTG): command-line utility that uses

SNMP to poll devices, collects data in a log file, and generates

HTML-based views of data

27Confidential

Performance and Fault Management (continued)

Figure : Map showing network status

28Confidential

Performance and Fault Management (continued)

Figure : Graphs generated by MRTG

29Confidential

Asset Management

Identifying and tracking hardware and software on a network First step is taking detailed inventory of each node on network

Asset management tool choice depends on organization’s needs Should ensure that asset management database regularly updated Simplifies maintaining and upgrading the network Provides info about costs and benefits of hardware or software

30Confidential

Software Changes

General steps:

Determine whether change is necessary

Research purpose of change and potential effects on other applications

Determine whether change should apply to some or all users

Notify system administrators, help desk personnel, and users

Schedule change for off-hours, if possible

Back up the current system or software

31Confidential

Software Changes (continued)

General steps (continued):

Prevent users from accessing system or part of system being altered

Keep upgrade instructions handy and follow them

Make the change

Test the system fully

If successful, re-enable access to system

If not, roll back changes

Communicate changes made

Record changes in change management system

32Confidential

Patches

Patch: correction, improvement, or enhancement to particular piece

of a software application

Changes only part of an application

Often distributed at no charge by software vendors

Fix bugs

Improve functionality

Back up system before installing

Install during off-hours

Test after installing

Regularly check with vendor for patches

33Confidential

Client Upgrades

Software upgrade: major change to a software package’s existing

code

Designed to add functionality and fix bugs in previous version of the

client

Typically overwrites some system files

Installation may affect other applications adversely

Test on single workstation before distributing to all users

Workstation-by-workstation or network installation

34Confidential

Shared Application Upgrades

Apply to software shared by clients on network

Same principles as modification of client software

Usually designed to enhance application’s functionality

Weigh time, cost, and effort against necessity

For significant upgrade, may need to provide user training

35Confidential

Network Operating System Upgrades

Usually involves significant changes to way servers and clients

operate

Requires forethought, product research, and rigorous testing before

implementation

May require specific project plan

Consider the following in project plan:

Effect on user IDs, groups, rights, and policies

Effect on file, printer, and directory access

Effect on applications or client interactions

Effect on configuration files, protocols, and services

36Confidential

Network Operating System Upgrades (continued)

Consider the following in project plan (continued):

Effect on server’s interaction with other devices

Accuracy of testing in simulated environment

How it will be used to increase efficiency

Technical support arrangement with OS’s manufacturer

Allotted enough time to perform upgrade

Can reverse the installation if troubles arise

Communicate benefits to others

37Confidential

Network Operating System Upgrades (continued)

Basic steps for performing upgrade:

Research

Project plan

Proposal

Evaluation

Training

Pre-implementation

Implementation

Post-implementation

38Confidential

Reversing a Software Change

Backleveling: process of reverting to previous version of software after attempting to upgrade

Table : Reversing a software upgrade

39Confidential

Hardware and Physical Plant Changes

Often performed to increase capacity, improve performance, or add

functionality to network

Proper planning is key to successful upgrade

Steps for changing network hardware:

Determine whether change necessary

Research upgrade’s potential effects on other devices, functions, and

users

Communicate change to others and schedule it

Back up current hardware’s configuration

Prevent users from accessing system

40Confidential

Hardware and Physical Plant Changes (continued)

Steps for changing network hardware (continued):

Keep installation instructions and hardware documentation handy

Implement change

Test hardware

Preferably with higher than normal load

If successful, re-enable access to device

If not, isolate device or reinsert old device

Communicate results of changes to others

Record change in change management system

41Confidential

Adding or Upgrading Equipment

Difficulty depends largely on experience with specific hardware

Networked workstation: simplest device to add

Directly affects only a few users

Does not alter network access for others

Networked printer: slightly harder than adding networked

workstation

Shared, unique configuration process

Time required to install does not usually affect productivity

42Confidential

Adding or Upgrading Equipment (continued)

Hub or access point:

Only worry about downtime if upgrading or swapping out existing hub or

access point

Must consider traffic and addressing implications

Server requires great deal of foresight and planning

Consider hardware and connectivity implications, as well as issues

relating to NOS

Add while network traffic low or nonexistent

Restrict access to new servers

43Confidential

Adding or Upgrading Equipment (continued)

Switches and routers: often physically disruptive

Affects many users

Router or switch may have unintended effects on segments other than

the one it services

Plan at least weeks in advance

Keep safety in mind

Follow manufacturer’s temperature, ventilation, antistatic, and moisture

guidelines

44Confidential

Cabling Upgrades

May require significant planning and time to implement

Best way to ensure future upgrades go smoothly is careful

documentation of existing cable

Upgrade cabling in phases

Weigh importance of upgrade against potential for disruption

Larger organizations rely on contractors who specialize in cabling

upgrades

45Confidential

Backbone Upgrades

Most comprehensive and complex network upgrade Upgrading entire backbone changes whole network

Examples: Migrating from Token Ring to Ethernet Migrating from slower technology to faster one Replacing routers with switches

May require upgrading cabling and hardware First step is to justify upgrade Second step is determining backbone design to implement

46Confidential

Reversing Hardware Changes

Provide a way to reverse hardware upgrades and reinstall old

hardware if necessary

Keep old components safe and nearby

Old hardware may contain important configuration information

47Confidential

Structured Cabling

Comprises of cables and associated hardware parts Provides an organized way of low voltage wiring Transmits data that is built in structured form Need of structured cabling:

Consistency – Standard cabling systems for Data, voice and video Cost Reduction – Reduces the cost by reducing the number of cables Troubleshooting – Isolates and fixes the problem Mobility – Network resources are portable Supports upgrading – Supports future applications

48Confidential

Design Considerations of Structured Cabling

49Confidential

Structured Cabling - II

Design Considerations of structured cabling Entrance Facilities – Connects the building with the outside world Equipment Room – Serves the users within the room Telecommunications Room – Accommodates the cabling system equipment Backbone Cabling – Interconnects telecommunications room, equipments

room and entrance facilities

50Confidential

Structured Cabling - III

Design Considerations of structured cabling

Horizontal Cabling – Extends from the work area telecommunications outlet

to telecommunications closet

Work Area – Components extend from the telecommunications outlet to the

stations equipment

51Confidential

Cable Distance – I

Horizontal Cabling Distance

horizontal cabling distance is 99 meters (TIA/EIA-568A)

6 meters of patch cable

90 meters horizontal (routed in the wall)

3 meters of station cable

99 meters total (rounded off to 100 meters)

Backbone cable Distance

Depends on type of cable being used and on its location

52Confidential

Pulling Cables - I

While dealing with structured cabling you have to pull out the cables from

some conduits and punch down the free end of the cable

Conduits are PVC or flexible plastic pipes used to organize the cables

Pull twine through the conduits

53Confidential

Pulling cables - II

Elements required for

pulling cables

Fish Tape Twine ConduitsScale and

TapePatch Panel

54Confidential

Pulling Cable Tools

Fish Tape Twine Conduit

Scale & Tape

Patch Panel

55Confidential

Cables

Two or more wires bound together, in protective jacket or sheath

Different types of cables:

Twisted pair cable

Coaxial cable

Optical fiber cable

Shielded and Unshielded cable

56Confidential

Cable Connectors – I

Part of cable which plugs into port or interface to connect one device to

another

Connectors: Male and Female

DB-15 connectors - Commonly used on electronic and computer equipment

RJ45 Connectors – Used in networking to connect computer to network card

BNC Coaxial Connectors – Used with coaxial cables or used with Ethernet

system

57Confidential

Cable Connectors – II

210 Patch Plug – Uses internal pair isolation, pair-to-pair compensation and

layered contacts

Token-Ring Data Connector – Used on end of a shielded twisted pair cable

Distinguishing Wires

Color coding makes identification each wire or pair of wires in the cable

easier

Tip and ring – Identifies plus wire and minus wire

58Confidential

Cabling Tools

Used in networking to work with wires or devices or to connect wires and

devices to each other

Different tools used are:

Punchdown Tools

RJ45 Crimping Tool

Coaxial Cable Crimping Tool

Pin Crimping Tool

Cable stripper

59Confidential

Working with Cables – I

Installation works in three stages:

Running cable from central point to the room

Wall jacks are mounted and cables ended into jacks

Wire cables from the central end to switchboard

Color Coding

Helps to classify different types of wires

Patch cable and cross over cable can be differentiated on the basis of

colour coding

60Confidential

Working with Cables – II

Tools and materials required for crimping cable:

RJ45 Crimping Tool

Wire stripper

Wire cutter

RJ-45 plugs

Cat-5 UTP cables

61Confidential

Working with Cables – III

Straight through Cable

Same pin out connections at both ends

Used to connect dissimilar devices

Crossover Cable

Modify pin out connections at one end

Used to connect similar types of devices

62Confidential

Working with Cables – IV

Weak Link Mostly, weakest link is the station cable, which runs from wall to desktop

Information Outlet Protect horizontal wiring from physical handling that cables receive Keep installation neat and eliminate unsightly snake pit of unused cables

coiled on floor Station Cable

Runs between information outlet and network node e.g. PC

63Confidential

RJ45 Modular Outlet

Device used to connect shielded or unshielded cables

Acts as extension where wires are fixed on the either side of modular

connector

64Confidential

Closet

Main point in an organization where major networking cabling come together

Equipment in a wiring closet includes:

Patch panels for vertical wiring

Patch panels for horizontal wiring

Wiring hubs

Uninterruptible Power Supplies

Types of wiring closets:

Intermediate Distribution Frames (IDF)

Main Distribution Frame (MDF)

65Confidential

Closet Details

Typical equipment in a wiring closet are:

Backbone wiring cross-connect device

Horizontal wiring cross-connect device

Patch cables

Wiring hubs

Backup power for wiring hubs

Router and modems

Access server

66Confidential

Cross-Connect Devices - I

Make easy to reconfigure horizontal and backbone wiring

Terminates cable or group of cables

Make terminations available for interconnection to other cables

In data networks – Small cross-connect device will terminate backbone

cable and make it available for connection to wiring hub

In wiring hub – Larger cross-connect device will terminate horizontal wiring

before it enters hub

67Confidential

Cross-Connect Devices - II

66M Punch Down Block

Patch Panel

68Confidential

Cabinets and Racks - I

Patch panels and wiring hubs can mount on wall in brackets, stand in

racks or reside in full cabinets that are racks with doors

If small installation – Mount patch panels and wiring hubs on wall

69Confidential

Cabinets and Racks - II

Distribution Rack

Full Equipment

Cabinet

Rack

70Confidential

Neat Cables

Used to avoid damage to cable pairs and used to tie the cables

Ties come in many sizes and materials

71Confidential

Uninterruptible Power Supplies (UPS)

Equip network file servers with backup

power

Allow wiring hubs to go without power

during power failure

72Confidential

Conduits

Plastic pipes that run through wall plate between wiring closets

If space left:

Used to pull a new cable

Used as replacement for a bad one

For added capacity

Fish tape

An equipment which is part of any installers toolbox

Consists of a reel of wire stiff enough to push its way through the conduit

73Confidential

Cable Trays

Provide large cable system

Wire rack designed to carry the weight of the cables

Common in modern wiring closets and in building infrastructure spaces such

as basements, airshafts, and ceiling

Point to note when cables run inside ceilings and walls

74Confidential

Configuring Backbone Cable

Wiring closet that contain patch and cross-connect panels which connect to

horizontal wiring

Backbone wiring link each wiring closet to cross-connect point or (MDF)

Locating the closet

Different parameters to keep in mind when going for closet

Backbone Cable

Modern installations use UTP or fiber-optic cable for the backbone

75Confidential

Installation of Racks

Explains how to place networking equipments and accumulate different

small equipment on the plate of the rack

Factors to be considered while installing the rack:

Location to install the rack

Installation holes marking

Installation of the rack nuts

Mount the different rails onto the rack

Mount the different devices onto the rack

76Confidential

Managing Cables

Cables:

Should not run over desk

Should not be entangled

To manage cables:

Free space on the desk where the cables will run

Holes at top of desk

Mount to protect cables

77Confidential

Wire Manager

Used to mange wires that are common to one place

Tools used to manage wires:

Cable ties

Conduits

Twines

Cable manager

Labels

Spiral wraps

Unitags

78Confidential

Labeling Cables

Used to identify path of the cables

Distinct color and pattern of code of cable label helps identify cables

Labels can be written with a pen or a pencil

Cables labeled using Label templates

Labels on Outlet

79Confidential

Case Study 1

The network administrator of the Mumbai branch of MoneyMaker bank is facing difficulties in maintaining the network. In case the network goes down due to some hardware failure, identifying the source of the problem and troubleshooting it is very time consuming. The layout of the network has not been changed since the time it was set up.

80Confidential

Problem

The maintenance and troubleshooting of the network is problematic and time consuming

81Confidential

Solution

Deploy a dedicated closet

Use full equipment cabinet

Use rack and configure the hardware

Use appropriate cable and crimp the cable

Define maximum backbone cable length and horizontal cable length

Use different wire manager

Use modular outlet and I/O plate

Use third party hardware monitoring or the troubleshooting devices

82Confidential

Summary

Project management is the practice of managing staff, budget,

timelines, and other resources and variables so as to complete a

specific goal within given bounds

A feasibility study determines whether a proposed project fits within

an organization’s budget, time, and staff restrictions

A needs assessment is the process of clarifying the reasons and

objectives for a proposed change

Project goals help keep a project on track

83Confidential

Summary (continued)

A project plan describes how the details of a managed project are

organized

The best way to evaluate a large-scale network or systems

implementation is to first test it on a small scale on a pilot network

Network management involves assessing, monitoring, and

maintaining network devices and connections

84Confidential

Summary (continued)

Baselining includes keeping a history of network performance, physical topology, logical topology, number of devices, OSs and protocols, and number and type of applications

An asset management system includes an inventory of the total number of components on the network as well as each device’s configuration files, model number, serial number, location on the network, and technical support contact

A patch is an enhancement or improvement to a part of a software application

85Confidential

Summary (continued)

A software upgrade represents a major change to the existing code

The process of upgrading an NOS should include research,

proposal, evaluation, training, pre-implementation, implementation,

and post-implementation phases

Hardware and physical plant changes may be required when your

network has problems

The most comprehensive and complex upgrade involving network

hardware is a backbone upgrade

86Confidential

Summary - I

Structured cabling system is a set of cabling which interconnects different equipments in an organization in a structured manner

Cable connectors are used to connect the cables Cabling tolls are helpful to make connection between the cable and the

connector Colour Code helps to identify the types of wires Cat5 cables are punched into Information outlet (IO) as per the colour

coding Jack Panel is used to connect horizontal cabling to network

87Confidential

Summary - II

Straight through cables have the pin out connections similar at both the ends

Cross over cable change the pin out connections at one end Installing the rack explains how to place networking equipments and

accumulate different small equipment on the tray of the rack Wire manager can organize the disorganized cables and makes it easy to

access Labeling the cables help you to identify the path of the cables and makes

the troubleshooting easy

Recommended