Click Here!
home account info subscribe login search My ITKnowledge FAQ/help site map contact us


 
Brief Full
 Advanced
      Search
 Search Tips
To access the contents, click the chapter and section titles.

Wireless Networking Handbook
(Publisher: Macmillan Computer Publishing)
Author(s): Jim Geier
ISBN: 156205631x
Publication Date: 09/01/96

Bookmark It

Search this book:
 
Previous Table of Contents Next


Configuration Management

The goal of configuration management is to track the versions of hardware and software elements residing on the network. When preparing for configuration management, decide what elements you want to manage the configuration of and select the appropriate tools. You should track the versions of software located on PCs and network operating systems, as well as the settings on switches and hubs. Most network operating system vendors include configuration management software as part of their network management solution. For example, you can use Microsoft’s SMS to query MIBs located on network interface cards, servers, and other elements to retrieve listings of software versions and configurations. You can set up the network management software to periodically obtain the information and store it in a database for future reference when troubleshooting problems.

Microsoft’s System Management Server (SMS) 1.1

Microsoft’s System Management Server (SMS) 1.1, which is designed to run on Microsoft Windows NT Server, primarily manages client and server software and hardware—devices capable of running the SMS client software element. SMS maintains a centralized Microsoft SQL database that stores configuration information of the SMS-managed devices. SMS detects the presence of machines and keeps an inventory of elements, such as applications, processor, operating systems, adapters, and available disk storage space. SMS also enables centralized distribution of software to networked clients. If upgrading an application, for example, you can install the new version on everyone’s computer via SMS.

Security Management

Network security protects information and ensures nothing interferes with operation of the system. The main idea is to take precautions to reduce the chance of security-related incidents and develop procedures for countering if something bad does occur. Network security mechanisms consist primarily of access control and the planning and execution of disaster recovery procedures. When preparing for security management, assign user passwords and resource rights as explained earlier in this chapter. In addition, be sure to incorporate virus protection procedures and plans for recovering from disasters.

Protecting Against Viruses

Viruses can enter your system via files downloaded from external networks and computers. The best way to protect against viruses is to follow the procedure illustrated in figure 9.5. Be sure to control viruses by scanning any files being loaded onto the system. Also, periodically check for the presence of viruses on the network as well.


Figure 9.5  Virus protection procedures.

Norton’s AntiVirus

Norton’s AntiVirus is an example of AntiVirus software. AntiVirus installs in your system and works automatically in the background, watching for disk activity that could indicate a virus. Norton AntiVirus detects and eliminates many types of viruses, ensuring backups and file transfers are virus-free.

Planning for Disaster Recovery

A disaster situation is anything that disrupts or has great potential of disrupting the use of the network. The detection of a virus on a PC would constitute a crisis situation because the virus may potentially spread to other PCs and cripple network operations, which could lead to a disaster. An electrical power blackout, accidental file deletion, and widespread virus attacks would most likely constitute a high level disaster in that they would cause a substantial disruption of the system.

To enable a swift reaction to disasters, develop disaster recovery plans offering step-by-step procedures on what to do if the network goes down. Generally in a panic situation, people will not be able to think clearly enough to react quickly. If you were flying an airplane and the engine went out, what would you do? Hopefully you wouldn’t become hysterical, but a well-tested checklist would surely help calm your nerves. A network disaster is not always a life-and-death situation, but there can be enormous pressure on the system administrator when a server’s hard drive crashes. You’d better play it safe and prepare a disaster plan having at least the major components shown in Figure 9.6.


Figure 9.6  The major components of a disaster plan.

During the operation of the network, occasionally run drills, if feasible, to test the disaster plans.

Maintenance

To perform preventative maintenance and repair network problems, you should establish a field service team that includes technicians who can troubleshoot network problems. Preventative maintenance helps spot network problems before they impact users. What type of preventative maintenance is necessary for networks? The general answer is anything that checks the condition of mechanical elements, such as cabling, connectors, and antenna positioning. In addition, for radio-based wireless networks, be sure to periodically check for potentially interfering radio signals. When you initially defined requirements and performed the site survey, any signals or other radio devices may not have been present that could have affected the LAN’s performance. However, as time passes, the organization or a nearby company could install a system that could cause interference problems. A periodic spectrum analysis or a simplified site survey would discover this before a problem occurs.

To adequately perform maintenance, whether it’s a preventative or reactive response to problems, you need to obtain some test equipment, such as a spectrum analyzer and protocol analyzer. As mentioned before, a spectrum analyzer will display the amplitude of signals present at various frequency points of interest. Therefore, you can use the spectrum analyzer to determine whether there are any signals present that may affect the wireless LAN propagation.

A protocol analyzer enables technicians to visualize the operation of network protocols as they traverse the network. A protocol analyzer captures data traffic, decodes and displays protocol headers and data, traps specific protocol functions, generates and transmits test data traffic, and triggers programmed alarms. These features enable technicians to efficiently troubleshoot network problems.


Previous Table of Contents Next


Products |  Contact Us |  About Us |  Privacy  |  Ad Info  |  Home

Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is prohibited. Read EarthWeb's privacy statement.