Sunday, January 19, 2020

computers and life :: essays research papers

Life in a modern technologhy requires skills in dealing with computers...CH 8 Network Management. 8.1 Network Documentation. *Cut sheet diagrams. The first and most critical component for a good network is documentation. Documentation is the most talked about and least performed task in a network. à ¯Ã¢â‚¬Å¡Ã‚ · diagrams that indicate the path of the physical wiring layout; à ¯Ã¢â‚¬Å¡Ã‚ · the type of cable; à ¯Ã¢â‚¬Å¡Ã‚ · the length of each cable; à ¯Ã¢â‚¬Å¡Ã‚ · the type of termination for the cable; à ¯Ã¢â‚¬Å¡Ã‚ · physical location of each wall plate or patch panel, and; à ¯Ã¢â‚¬Å¡Ã‚ · A labeling scheme for easy identification of each wire. * MDF and IDF layouts This is a Physical and logical layout of the Main Distribution Facility and all of the Intermediate Distribution Facilities in the network, layout of rack mounts, auxiliary equipment, and servers in the distribution facility, patch panel labels to identify cable terminations. Identification and configuration details of all equipment located in the distribution facility. *Server and workstation configuration details This is any physical detail of the computer, model and serial number, Physical location, user, and network identification. *Software listings Standard and special software used on each machine in the network. This list includes operating system and application software. *Maintenance records It is also valuable to keep a list of all repairs that have been done to all equipment included in the network. This will help an administrator predict possible future problems with existing hardware and software. *Security measures Includes "soft" security, such as user rights, password definition, and firewall support, but also physical security. Physical or hard security includes things as simple as identifying how the MDF and IDF's are locked, who has access to these rooms and why, how the hosts are protected (security cables - alarms), and who has physical access to the system. *User policies They contain how the users can interact with the network. These policies include what is and what is not permissible on the network. It should also include what the consequences of violating user policies will be. Other aspects of user policies include what minimum user ID and password length should be, and rules for the content of passwords. 8.2 Network Security includes the following. * Network access It involves making the network as secure as possible against unauthorized access. This is done by establishing security policies, such as minimum password length, maximum password age, unique passwords (not allowing the same password repeated), and only allowing the user to logon to the network at particular times of the day or days of the week. computers and life :: essays research papers Life in a modern technologhy requires skills in dealing with computers...CH 8 Network Management. 8.1 Network Documentation. *Cut sheet diagrams. The first and most critical component for a good network is documentation. Documentation is the most talked about and least performed task in a network. à ¯Ã¢â‚¬Å¡Ã‚ · diagrams that indicate the path of the physical wiring layout; à ¯Ã¢â‚¬Å¡Ã‚ · the type of cable; à ¯Ã¢â‚¬Å¡Ã‚ · the length of each cable; à ¯Ã¢â‚¬Å¡Ã‚ · the type of termination for the cable; à ¯Ã¢â‚¬Å¡Ã‚ · physical location of each wall plate or patch panel, and; à ¯Ã¢â‚¬Å¡Ã‚ · A labeling scheme for easy identification of each wire. * MDF and IDF layouts This is a Physical and logical layout of the Main Distribution Facility and all of the Intermediate Distribution Facilities in the network, layout of rack mounts, auxiliary equipment, and servers in the distribution facility, patch panel labels to identify cable terminations. Identification and configuration details of all equipment located in the distribution facility. *Server and workstation configuration details This is any physical detail of the computer, model and serial number, Physical location, user, and network identification. *Software listings Standard and special software used on each machine in the network. This list includes operating system and application software. *Maintenance records It is also valuable to keep a list of all repairs that have been done to all equipment included in the network. This will help an administrator predict possible future problems with existing hardware and software. *Security measures Includes "soft" security, such as user rights, password definition, and firewall support, but also physical security. Physical or hard security includes things as simple as identifying how the MDF and IDF's are locked, who has access to these rooms and why, how the hosts are protected (security cables - alarms), and who has physical access to the system. *User policies They contain how the users can interact with the network. These policies include what is and what is not permissible on the network. It should also include what the consequences of violating user policies will be. Other aspects of user policies include what minimum user ID and password length should be, and rules for the content of passwords. 8.2 Network Security includes the following. * Network access It involves making the network as secure as possible against unauthorized access. This is done by establishing security policies, such as minimum password length, maximum password age, unique passwords (not allowing the same password repeated), and only allowing the user to logon to the network at particular times of the day or days of the week.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.