Lab 2.5.3 Investigating Network Monitoring Software


Step 1: SNMP overview
Simple Network Management Protocol is a common network management protocol. The protocol enables
network administrators to gather data about the network and corresponding devices. SNMP management system software is available in tools such as CiscoWorks. SNMP management agent software is often embedded in operating systems on servers, routers, and switches.
SNMP has four main components:
  • Management station
  • Management agents
  • Management Information Base (MIB)
  • Network management protocol
Descriptions of SNMP are available at:
http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/snmp.htm
http://www.protocols.com/pbook/tcpip9.htm#SNMP
As part of a network management system, SNMP tools can respond to network errors or failures in several ways. Generally, when a network fault occurs, or when predefined thresholds are met; the SNMP tools can react by:
  • Sending an alert on the network
  • Sending a message to a pager
  • Sending an email to an administrator
The FilmCompany is required to maintain a specified level of network service to meet its StadiumCompany contract obligations. They need to purchase network management software that enables them to monitor and manage the new upgraded network.
Step 2: Search for SNMP monitoring programs
a. Using a computer with Internet access, use a web browser to search for examples of SNMP monitoring programs. Use search terms such as:
  • SNMP reporting
  • SNMP notification
  • SNMP monitoring
b. List other appropriate search terms.
c. Note and compare the features of a number of the monitoring programs found.
Name:
Website:
Key features:
Name:
Website:
Key features:
Name:
d. Select a program that would be suitable for the FilmCompany network and give reasons for your
selection. Discuss your choice of program with other students.
Program:
Website:
Reasons:

Step 3: Example SNMP program
An example SNMP monitoring program is Plixer Denika v7.
a. Go to the website for this program at http://www.plixer.com/products/denika.php.
b. List the type of reports that this program can generate.
Laporan Pemanfaatan
Laporan Level Layanan
Laporan TOPn
Laporan Terjadwal
c. Read the details for each type of report. Select the report type that would be most applicable to ensure a problem with the performance of the link carrying real time video data from the StadiumCompany to FilmCompany was addressed as soon as possible. Summarize the features of this reporting provided by this program.

Step 4: Reflection
Consider and discuss the organizational or business support necessary to make best use of network monitoring programs with event-triggered notification features.
Ambang batas peristiwa dan kondisi yang memicu pemberitahuan harus disetel sehingga tidak perlu notifikasi tidak terkirim, tapi kondisi kritis dilaporkan dan pemberitahuan dikirim. Karyawan Perseroan yang harus diberitahukan baik secara teknis mampu mengatasi masalah ini dan tersedia untuk melakukannya ketika diberitahu. Hal ini akan membutuhkan tindakan perusahaan untuk memastikan bahwa staf terlatih dalam merespon proses, dalam keterampilan teknis, dan dalam mengatasi masalah dan pemecahan masalah. Daftar nama karyawan dan alokasi tugas perlu mempertimbangkan masalah ini.

Lab 2.5.2 Monitoring Network Performance


Step 1: Configure network connectivity
a. Connect the devices in accordance with the given topology and configuration. Your instructor may substitute Discovery Server with an equivalent server for this lab.
b. See your instructor regarding device configuration. If the devices are not configured from the Admin PC, establish a terminal session in turn to each switch and the router using HyperTerminal or TeraTerm. Configure these devices in accordance with the configuration details provided.
c. Ping between all devices to confirm network connectivity. Troubleshoot and establish connectivity if the pings fail.

Step 2 Set up Cisco Network Assistant
a. From the Admin PC, launch the Cisco Network Assistant program.
b. Set Cisco Network Assistant to discover the network. Establish a “community” of devices.
1) From the Application menu, select Communities.
2) In the Name field, enter FilmCompany.
3) From the Discover drop-down list, select Devices in an IP address range.
4) Enter the start and end addresses of the router and two switches.
Start IP address ________________________ 10.0.0.1
End IP address ________________________ 10.0.0.5
c. Display the network topology and add the found devices to the community.

Step 3: Monitor network traffic
Examine the different bandwidth graphs for the network devices and determine what graphs are the most useful for monitoring network traffic at this stage.
a. Use PC1 to generate network traffic.
b. Ping and telnet to Discovery Server.
c. Open the Discovery Server home web page in a browser on PC1.
d. Use FTP to download a file from Discovery Server.

Step 4: Review the data
Typical network monitoring would be performed over a period of time. Discuss with other students and record here what conclusions could be drawn from the limited information monitored in this lab. What area do you think requires more investigation before the information would be useful in planning a network upgrade?

Step 5: Clean up
Erase the configurations and reload the routers and switches. Disconnect and store the cabling. For PC hosts that are normally connected to other networks (such as the school LAN or to the Internet), reconnect the appropriate cabling and restore the TCP/IP settings.

Step 6: Reflection
The usefulness of monitoring network traffic and performance is maximized when the full range of network usage and service situations has been recorded. Consider and discuss when recorded network performance data should be considered for network design purposes and occasions when it should not be included.
Memastikan peristiwa luar biasa yang berefek terhadap lalu lintas jaringan dan kinerja yang tidak termasuk kriteria misalnya darurat sipil. Rentang waktu pemantauan perlu mencakup semua siklus bisnis puncak dan siklus bisnis non-puncak.

Lab 2.4.2 Identifying Organizational Constraints


Step 1: Identify possible project constraints
a. Use word processing software to create a project constraints document.
b. Develop a list of possible constraints that set limits or boundaries on the network upgrade project by
brainstorming ideas with other students.
Kendala bisa dalam bentuk pembelian perangkat keras yang tepat, mempekerjakan staf yang cukup untuk mengelola upgrade, sumber daya untuk melatih personil mengelola upgrade, biaya garansi. Saat ini kebijakan perusahaan mungkin menerapkan pembatasan untuk meng-upgrade jaringan dalam bentuk keamanan atau penggunaan. Apakah ada fungsi baru, seperti VPN, yang diperkenalkan dalam desain jaringan yang tidak konsisten dengan kebijakan pengguna dalam perusahaan saat ini? Apakah desain jaringan yang diusulkan akan selesai dalam waktu yang telah ditentukan? Bagaimana desain ini mempengaruhi TI lain atau proyek-proyek perusahaan lain?
c. Classify each constraint as one of the four following types:
  • Budget
  • Policy
  • Schedule
  • Personnel
Step 2: Tabulate the relevant constraints
a. Relate the list of constraints to the prioritized business goals of the FilmCompany.
b. Develop a definitive list of items that apply specifically to the FilmCompany case study.
c. Enter the constraints into a table.
d. Save your Project Constraints Checklist document and retain it for the next stages of this network design case study.

Step 3: Reflection
The constraints imposed on this network design project are determined by the internal requirements of the FilmCompany. Consider and discuss external constraints. Include constrains that may be beyond the control of the business but which, in some circumstances, affect a network design project.
• Kekurangan personil trampil
• Tidak tersedianya peralatan atau kabel dari spesifikasi teknis yang diperlukan
• Kurangnya akomodasi ke rumah usaha yang diperluas dan infrastruktur jaringan
• Terbatasnya akses ke WAN eksternal dan infrastruktur Internet

Lab 2.4.1 Establishing Technical Requirements


Step 1: Determine the technical requirements
a. Use word processing software to create a technical requirements document.
b. From the case study document and checklists developed in previous labs, identify and list the technical requirements that will enable the network upgrade to meet the FilmCompany business goals. The technical requirements document provides direction for the network designer in the following decisions:
  • Selecting network equipment
  • Designing the topology
  • Choosing protocols
  • Selecting network services
c. Discuss these technical requirements with another student, or in a group. Consider the range of possible technical solutions to meet the business goals of the FilmCompany.

Step 2: Prioritize the technical requirements
The network designer works with the customer to create a prioritized list of technical requirements. This list will be used to define the project scope.
a. Rank the list of technical requirements in order of priority. Base this ranking on the information in the case study document and discussion with other students.
It is useful to categorize the technical requirements into the following areas:
  • Availability and Performance
  • Security
  • Scalability
  • Manageability
b. List the ranked technical requirements in a table and assign a priority value as a percentage. The total of the percentage values must equal 100.
c. Discuss your priority values with other students. If there are differences in priorities discuss why this has occurred and attempt to resolve them.
d. Save your Project Prioritized Technical Requirements Checklist document and retain it for the next stages of this network design case study.

Step 3: Reflection
When discussing technical requirements with the customer, the network designer must consider the technical level of the audience. Technical terms and jargon may not be clearly understood by the customer. Such terms should either be avoided or tailored to the level of detail and complexity that the customer can understand.
Compile a list of networking technical terms and jargon that may need to be expressed or explained to a nontechnical business customer. Develop an explanation or definition for each term that a non-technical business customer can understand for the purpose of discussing a network upgrade with them.

Lab 2.3.2 Creating a Network Organization Structure


Step 1: Determine the network users
a. Use word processing software to create a network organization structure document.
b. Examine the FilmCompany case study document and the sample interview.
c. Identify and list the potential end users.
Staf umum
Staf penjualan
Staf media produksi
Vendor, pemasok, dan mitra Pelanggan
d. Diagram the relationship between these users.
Draw circles on a page and label each with a type of network user
Use lines to connect together those groups that directly communicate with each other

Step 2: Assess impact of user network access
a. Identify and include the different types of existing and potential new network services the listed users may require. Group the users under the type of network services they use.
Wireless, VOIP, management vlan, security, etc.
b. The impact of adding new user groups to the network also needs to be assessed. Identify and include in the network organization structure document:
  • New user groups
  • The type of access required
  • Where access is allowed
  • The overall impact on security
c. Save your network user structure document and network organization diagram and retain it for the next stages of this network design case study.

Step 3: Reflection
The total number of users has a direct impact on the scale of the network at the Access Layer. The type of users and the services they require also have implications for the network structure.
Discuss and consider the impact that the range of network services required by even a relatively small number of users can have on the network structure.

Lab 2.1.6 Observing Traffic Using Cisco Network Assistant


Step 1: Establish the network baseline criteria
Network baselining is the measuring and rating of the performance of a network as it transports data in real time. A baseline is a type of “network snapshot” of the devices and their performance. Creating a baseline enables you to see the current network load and, by maintaining that baseline, identify network issues before they become critical. For example, with all the network routers baselined, including the CPU capability and usage, if gradual increases in CPU usage are noted, the issue can be addressed before network performance deteriorates.
List the devices in the lab network and the characteristics that should be monitored.
Router, Switches, PC Host, Server, Bandwidth

Step 2: Configure network connectivity
NOTE: If the PCs used in this lab are also connected to your Academy LAN or to the Internet, ensure that you record the cable connections and TCP/IP settings so these can be restored at the conclusion of the lab.
a. Connect the devices in accordance with the given topology and configuration. Your instructor may substitute Discovery Server with an equivalent server for this lab.
b. See your instructor regarding device configuration. If the devices are not configured, then from the Admin PC, establish a terminal session in turn to each switch and the router using HyperTerminal or TeraTerm. Configure these devices in accordance with the configuration details provided.
c. Ping between all devices to confirm network connectivity. Troubleshoot and establish connectivity if the pings fail.

Step 3: Set up Cisco Network Assistant
a. From the Admin PC, launch the Cisco Network Assistant program.
b. Set Cisco Network Assistant to discover the network. One method is to establish a “community” of devices. From the Application menu, click Communities
c. In the Communities window, click Create.
d. In the Name field, enter FilmCompany.
e. List the four options available in the Discover field:
Sebuah perangkat tunggal dengan alamat IP
Perangkat menggunakan seed alamat IP
Perangkat pada subnet
Perangkat dalam kisaran alamat IP
f. From the Discover drop-down list, select Devices in an IP address range.
g. At the Start IP address, enter 10.0.0.1
h. At the End IP address, enter 10.0.0.5
i. Click Start. The devices found will be listed.
j. Click OK on the Create Community and Communities dialog boxes. Note the range of icons now available on the top toolbar.
k. Click the Topology icon on the top toolbar and view the topology that Cisco Network Assistant has created.

Step 4: Examine Cisco Network Assistant features
Cisco Network Assistant provides a range of features to display text and graphical information about the network devices. From the topology view window, right click each device’s ID and select properties.
What protocol is used to discover and obtain the device information displayed?
Cisco Discovery Protocol

Step 5: Examine sample Cisco Network Assistant output
Once devices are added to the community, the links can be monitored from the Monitor tab of Cisco Network Assistant.

Step 6: Clean up
Erase the configurations and reload the routers and switches. Disconnect and store the cabling. For PC hosts that are normally connected to other networks (such as the school LAN or to the Internet), reconnect the appropriate cabling and restore the TCP/IP settings.
Challenge
This lab focused on monitoring individual devices in a network. Consider, research, and discuss the network factors that should be included in network baseline measurements.
• Pengujian dan pelaporan konektivitas fisik
• Pemanfaatan jaringan normal
• Pemanfaatan jaringan puncak
• Penggunaan protokol

Lab 2.1.3 Creating a Project Plan


Step 1: Evaluate the current network, operations, and network management infrastructure
a. Use word processing software to create a Project Plan Checklist document based on this lab.
b. From the case study, document, identify, and assess the current state of the following factors:
  • Physical facilities: Pada kapasitas / peluang untuk tumbuh
  • Environmental facilities: Pada kapasitas / peluang untuk tumbuh
  • Electrical facilities: Pada kapasitas / peluang untuk tumbuh
For each factor, indicate whether it is at capacity or has scope for growth. Include these factors on the checklist with your assessment.
c. Assess the ability of the current operations and network management infrastructure to support a new technology solution. On the checklist, list the following categories and include what changes must be completed before the implementation of any new technology solution.
  • Infrastructure
  • Personnel
  • Processes
  • Tools
d. Identify and add to the checklist any custom applications that may be required for the new network.

Step 2: Outline the project plan
a. To manage the project, the project plan includes five components. List these five components and an example of each, and then add them to the checklist.
1) Tasks· (Install wireless Access Points, mengkonfigurasikan  router)
2) Timelines and critical milestones· (kalender atau chart)
3) Risks and constraints· (Temporary loss of services, budget)
4) Responsibilities· (alokasi tugas)
5) Resources required: (pengkabelan, perlengkapan, waktu, keterampilan khhusus)
b. The plan needs to be within the scope, cost, and resource limits established by the business goals.
List any potential issues that the FilmCompany may have to consider to meet these goals, and then add them to the checklist.
Sumber dana untuk membiayai proyek.
Apa yang dapat dicapai dalam batas waktu yang ada?
c. The FilmCompany and the stadium management need to assign staff to manage the project from each of their perspectives. List the desirable skills and knowledge that these individuals should possess, and then add them to the checklist.
Keterampilan komunikasi yang baik
Keterampilan organisasi dan perencanaan yang baik
Pengetahuan layanan jaringan yang up to date
Pengetahuan dan keterampilan teknis jaringan sekarang
d. Save your Project Plan Checklist document. You will use it during the next stages of this network design case study.

Step 3: Reflection
Sometimes apparent urgency, pressure to present results, and enthusiasm for a project can create a work environment that causes projects to be started before proper planning has been completed.
Consider and discuss the potential problems that result from starting a network upgrade before completely assessing the existing network.
Peralatan baru yang mungkin tidak kompatibel dengan peralatan yang ada.
Infrastruktur jaringan yang ada mungkin dapat menjalankan layanan baru.
Peralatan baru yang tidak perlu bisa dibeli.
Hilangnya layanan jaringan mungkin terjadi ketika upgrade berlangsung.
Waktu dan anggaran keuangan dapat melebihi batas.

Lab 7.3.6 Identifying Risks and Weaknesses in the Design


Task 1: Identify areas of risk and weakness in the server farm implementation

Step 1: Analyze the physical topology
Examine the server farm topology as one entity and as a part of the entire FilmCompany topology. Look for each of the risks and weaknesses listed in the chart. Describe the devices, connections, and issues that you find, or record None found if the design appears to avoid risks in that area.
Weakness
Risk
Description of Location and Devices
Single point of failure
If a device fails, a portion of the network will be inoperable.

Large failure domain
If a device or link fails, a large portion of the network will be affected

Possible bottlenecks
If the traffic volume increases, there
is a potential for response time to
degrade.

Limited scalability
If the network grows more rapidly than expected, a costly upgrade will be needed.

Overly-complex design
If the design is too complex, the current staff will not be able to support it properly.

Other possible
weaknesses (specify):



Step 2: Analyze the results and conclusions of the testing
Basic router and switch configurations were modified to support the following protocols and functions.
Evaluate the results and conclusions that were drawn from the testing. Identify any areas where modifications to the configuration would provide better results, both now and in the future.

No Change Needed
Modifications Possible
VLAN port assignments


VTP client/server assignments


Root bridge designations


Switch security


Traffic filtering through ACLs


Other (specify):




Task 2: Suggest modifications to the design to address identified risks and weaknesses
From the analysis performed in Task 1, list each risk or weakness and suggest possible changes to the
design to minimize or eliminate it.

Lab 7.3.5 Testing a Prototype Network


Task 1: Assemble and connect component devices

Step 1: Review the Topology Diagram and the Equipment section of the test plan
a. Determine which equipment or suitable substitutes will be required to meet the objectives of the lab.
b. Modify the topology diagram as necessary to fit available equipment.

Step 2: Review the Installation Checklist provided in lab 7.3.2.
Accommodate any equipment limitations with the use of loopback addresses.


Task 2: Perform Test 1: Basic Connectivity Test

Step 1: Using the Installation Checklist, perform the steps to connect and configure the prototype network to perform Test 1.

Step 2: Perform the Test 1 procedures according to the Server Farm Design Test Plan and record the results in the Results and Conclusions section.

Determine if the test was successful. If not, discuss your results with your instructor and the other students in your class. Perform the test again if necessary.

Task 3: Perform Test 2: VLAN Configuration Test

Step 1: Using the Installation Checklist, perform the steps to connect and configure the prototype network to perform Test 2.

Step 2: Perform the Test 2 procedures according to the Server Farm Design Test Plan and record the results in the Results and Conclusions section.
Determine if the test was successful. If not, discuss your results with your instructor and the other students in your class. Perform the test again if necessary.


Task 4: Perform Test 3: VLAN Routing Test

Step 1: Using the Installation Checklist, perform the steps to connect and configure the prototype network to perform Test 3.

Step 2: Perform the Test 3 procedures according to the Server Farm Design Test Plan and record the results in the Results and Conclusions section.
Determine if the test was successful. If not, discuss your results with your instructor and the other students in your class. Perform the test again if necessary.


Task 5: Perform Test 4: ACL Filtering Test

Step 1: Review security goals for the FilmCompany network
Examine the test plan, checklist, and other documentation to determine how ACLs can support the security goals.

Step 2: Examine results of connectivity tests to determine targets for the ACLs
Decide which devices should be permitted, which protocols should be used, and where ACLs should be
placed.

Step 3: Create ACLs

Step 4: Using the Installation Checklist, perform the steps to connect and configure the
prototype network to perform Test 4.

Step 5: Perform the Test 4 procedures according to the Server Farm Design Test Plan and record the results in the Results and Conclusions section.
Determine if the test was successful. If not, discuss your results with your instructor and the other students in your class. Perform the test again if necessary


Task 6 Reflection
Examine the test results and conclusions. How this network would be affected if:
1. The number of servers was doubled?
Lalu lintas di S2 akan meningkat. Mungkin akan bermanfaat menambahkan saklar dan pemecahan server untuk menghindari single point of failure.

2. The S2 switch had a system failure?
Akses ke server akan hilang.

3. A new branch office with 25 new hosts was added?
Beban pada router R2 atau R1 akan meningkat tergantung pada akses apa yang dibutuhkan pengguna terhadap sumber daya.

Now that you have followed the process of prototyping from creating the plan through testing and recording results and conclusions, what are the advantages and disadvantages of using a simulation program, such as Packet Tracer, compared to building the prototype with physical devices?
Penggunaan program simulasi dapat sangat membantu dalam skenario pengujian berbagai koneksi, alamat IP dan isu-isu lainnya. Perangkat lain dapat dimasukkan ke dalam bermain daripada ketika membangun prototipe menggunakan peralatan yang nyata, namun tidak ada pengganti untuk menggunakan perlengkapan nyata, jika tersedia.

Lab 7.3.2 Creating a Server Farm Test Plan


Task 1: Review the Supporting Documentation

Step 1: Before completing the Server Farm Design Test Plan, review the following materials:
  • The prototype topology diagram included at the top of this lab
  • The IP Address Plan and VLAN Plan for the prototype topology in the Server Farm Design Test Plan provided with this lab
  • The Prototype Network Installation Checklist created by the network designer and provided with this lab
  • The partially completed Server Farm Design Test Plan provided with this lab
Step 2: Describe the functions of the network that the designer wants to test with this prototype
Konektivitas dasar, konfigurasi VLAN, operasi VTP, VLAN routing, penyaringan ACL.

Step 3: Using the topology diagram, create a list of the equipment necessary to complete the prototype tests
List any cables that are needed to connect the devices as shown in the topology diagram. Use the information from this list to fill out the chart in the Equipment section of the test plan document.
2 Router, 3 switch, 2 PC, 1 Server, 6 Cat 5 Straight-through kabel, 6 Cat 5 crossover kabel, 1 console cable.


Task 2: Determine the Testing Procedures
Using the information contained on the Prototype Network Installation Checklist and the partially completed Server Farm Design Test Plan document, determine what procedures should be followed to perform each test listed on the plan. Using Test 1 as an example, fill out the procedures sections for Tests 2, 3, and 4.
Think about which commands and tools (such as ping, traceroute, and show commands) you can use to verify that the prototype network is functioning as designed. Decide which outputs to save to prove the results of your tests.


Task 3: Document the Expected Results and Success Criteria
Carefully identify what you expect the results of each test to show. What results would indicate that the tests were a success?

Test 2: VLAN Configuration Test
Show vlans, show spanning-tree, show interface, failure of ping between VLANs

Test 3: VLAN Routing Test
Show vlans, show interface, show IP route, traceroute, and successful ping between VLANs.

Test 4: ACL Filtering Test
Show running config, show interface, show IP route, traceroute, attempts to access unauthorized resources denied.
a. Fill in the Expected Results and Success Criteria section for each test, using the information collected above.
b.Save the completed Server Farm Test Plan. It will be used in subsequent labs.
Reflection
Why is it important to think about and document the expected results and success criteria for each of the individual tests?