Common software and management maintenance in network management

Source: Internet
Author: User

Common software improve the overall level of domestic network management compared to overseas, the domestic network management started late, the user's management level is less than overseas. Koreb actively applies this technology to network fault resolution, network performance improvement and network security protection, aims to improve the level of domestic network management, shorten the gap with foreign countries, to help users achieve full visibility of their network, through the network phenomenon to see the essence of the real control of their own network. Help network managers refine network managementNetwork Analysis Technology is the key to network management, is the network into the deep-level management of the necessary technology, network analysis technology is the inevitable trend, Koreb actively help users to build this technology in-depth understanding! Launched in the official website free version of the software for the vast number of technology enthusiasts to communicate with, while targeted to provide a large number of technical learning documents and video materials, and organize the power in the relevant forums to answer users ' questions and share resources, in order to promote the technology in the country's popularity, so that users have real access to advanced network management technology. network Administrator network administrator mainly for the current domestic institutions, enterprises and institutions of the network application status, such as the total unit export bandwidth Limited, network abuse, employee Internet access, chat, etc., provides a simple, effective management functions. Net Shield netsos3.0 Network Shield Netsos is a modular architecture of LAN management software, a total of 12 powerful features. According to the actual needs, on-demand access to ensure IT investment returns.
Management and Maintenance Introduction Network management and maintenance is a very complex task, although the network management has established international standards, there are many network management platform and system, but to really do a good job of network management is not a simple thing. Below we will introduce some new forms of network management under the development of network technology, and some network management experiences based on long-term network management practice. VLAN Management VLAN (virtual local area network) is a computer network, in which the computer seems to be connected by the same network cable, and in fact, they may be divided into different areas of the LAN. VLANs are more likely to be implemented through software than hardware, so this makes it highly flexible. One of the main features of VLANs is that it provides more administrative control, reduces relative daily management overhead, and provides greater configuration flexibility. these features of the VLAN include: ① simplifies configuration operations and process modifications when users move from one location to another, ② the traffic distribution when the network is blocked, ② provides detailed reports of traffic and broadcast behavior, and counts the size and composition of the VLAN logic region ④ provides increased and reduced user flexibility based on the actual situation in the VLAN. VLAN Management These operations must be performed transparently, without the need to have too many real-world network connections, or without knowing how to reconfigure the protocol. While it is possible for a user to configure VLANs directly by setting or resetting the port of the VLAN, it lacks the help of intelligent network management tools, and it is difficult to ensure that VLANs communicate properly between several departments. VLAN Configuration If you define VLANs based on switch ports, it is often easy to assign one or more users to specific VLANs with some kind of drag-and-drop software. In a non-switched environment, moving, adding, or changing operations can be cumbersome, and it may be necessary to change the jumper on the terminal to charge one hub port to move to another port. However, it is still manual to change the VLAN allocation: It takes time to do this in large networks, so many networked vendors are advocating the use of VLANs to simplify move, add, and change operations. the VLAN assignment scheme based on MAC addresses does automate some of the move, add, and change operations. If a user is assigned to a VLAN or multiple VLANs based on the MAC address, their computer can connect to any one of the ports on the switched network, and all traffic will arrive at the destination correctly and without error. Obviously, the administrator wants to do the initial VLAN assignment, but the user moving to a different physical connection does not require manual intervention in the management console; For example, there are many mobile users, they are not always connected to the same port-perhaps because the office is temporary, using a VLAN based on MAC address can avoid a lot of trouble. What about the traditional Layer3 technology? This leaves the VLAN closest to the IP subnet: Each subnet requires a router port because traffic can only be moved from one subnet to another subnet through one router. Because the address space provided by the IP32 bit address is very limited, it is difficult to divide the network address of the gametes, and see if you are familiar with binary algorithms. Therefore, moving, adding, and changing operations in an IP network is difficult, slow, error-prone, and costly. In addition, it may be necessary to renumber the network when companies replace I or adopt a new security policy, which is unthinkable for large networks. in fact, if someone uses an existing routed IP network with subnets and accesses any VLAN member based on the IP address, the router may be overwhelmed by unnecessary traffic. If there are VALN members in many subnets, the usual VLAN broadcasts must pass through the router to reach all members. In addition, the bad is that the wide-area link generates additional broadcast traffic, and the number of VLAN members with WAN connectivity services should usually be kept to a minimum. In fact, VLAN member values based on Layer3 addresses can be useful in enhancing and modifying existing subnet distributions, for example by adding two new nodes to the VLAN via a full subnet, or by using two subnets to form a VLAN without renumbering. Cabletron's securefast Virtual Networking Layer3 Switching technology employs a routing server model rather than a traditional routing model. The first packet is routed to the routing server for regular routing calculations, but the switch can remember the path, so that subsequent packets can be exchanged in Layer2 without having to look up the routing table. With a VLAN based on a pure Layer3 address, the IP address can be used as a common network ID, allowing anyone to connect to any data link for full network access and greatly simplify the move, add, and change tasks. However, there are other ways to address the management problems caused by IP subnets. DHCP (Dynamic Host Configuration Protocol) Other technologies that have assigned addresses to users at the time of connection can be used to address these issues. WAN Access ManagementIn a network management solution, we know that a large network, typically a WAN, is managed hierarchically. For example, in a nationwide network center, there are many regional network centers, the General National Network Center to ensure that the backbone of the WAN normal operation, and regional Network Center is mainly responsible for the access management of various network users. WAN Access Management for each user who wants to access the network, the first thing to consider is how to pick up the network connection. The general user needs to find the Regional Network Center that is responsible for the area, and then make the application, and finally the network center of the area will perform the user's access operation. These operations typically include: ⑴ networked users must hire a network line to connect users to regional network centers. The line can be existing, belong to a commercial network company or a telecommunications company, or it can be a separate route for that user. The line may be either a DDN line using fiber optics or a DDR line using a telephone line. A networked user renting a network line will pay rent to the operator of the line, and the operator of the line may not be a regional network center providing access services. ⑵ connected users need to apply to the Regional Network Center for a section of their own IP address, and then register the domain name in the National Network Center. ⑶ for connected users, generally to the Regional Network Center to pay a one-time access fees, and then the Regional Network Center for the user network access to the relevant configuration. ⑷ also needs to be configured on the networked client side, then open the user's network connection, and finally networked users will need to pay the network according to the traffic they use network resources. As can be seen in the above operation, the Regional Network Center to the new network users to meet the needs of the corresponding configuration, these configuration operations generally include: ⑴ on the access router, select an idle port, configure it on that port, and then configure the routing information for that port based on the topology of the pick-up. ⑵ in the access router, according to the user's IP address range to establish a access-1ist group, once the user requirements or other circumstances (such as the user does not pay the fee, etc.), you can immediately disconnect the user's network connection. ⑶ the router port and connect the network user's line joins the net management monitoring object Set, guarantees provides the user the reliable, the stable network pick-up service.

Common software and management maintenance in network management

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.