What Are the Common Network Management Problems?
Network management includes the use, integration, and coordination of hardware, software, and human resources in order to monitor, test, configure, analyze, evaluate, and control network resources. , Service quality, etc. In addition, when a network failure occurs, it can report and deal with it in time, and coordinate and maintain the efficient operation of the network system. Network management is often referred to as network management.
Network management
(Internet technical terms)
- Simple Network Management Protocol (SNMP) is one of the earliest proposed network management protocols. SNMP has become the de facto industry standard in the field of network management, and is widely supported and applied. Most
- The rapid development of the network has resulted in a more complex network structure.
- Traditional LAN management is mainly aimed at a certain range of
- Improve the overall level of domestic network management
- Compared with overseas, domestic network management started late, and the management level of users is not as good as overseas. Claire actively applies this technology to network fault resolution, network performance improvement and network security protection. It aims to improve the level of domestic network management, shorten the gap with foreign countries, and help users realize full visualization of their networks. The phenomenon sees the essence and truly controls its own network.
- Help network managers refine network management
- Network analysis technology is the key to network management, and it is a necessary technology for the network to enter deep management. The popularity of network analysis technology is also an inevitable trend. Kelai actively helps users build in-depth knowledge of this technology! The free version of the software is launched on the official website for the exchange of technical enthusiasts. At the same time, it provides a large number of technical learning documents and video materials. The popularity in the country allows users to effectively access advanced network management technology.
Introduction to Network Management
- Network management and maintenance is a very complicated task. Although international standards have been formulated on network management, and there are many network management platforms and systems, it is not easy to really do a good job of network management. In the following, we will introduce some new forms of network management under the development of network technology, and some network management experiences based on long-term network management practices.
VLAN Network Management VLAN Management
- A VLAN (Virtual Local Area Network) is a computer network. The computers in it seem to be connected by the same network cable. In fact, they may be located in different areas of the LAN. VLAN is implemented more by software than hardware, so this makes it very flexible. A major feature of VlAN is to provide more management control, reduce the relative daily management overhead, and provide greater configuration flexibility.
- These features of VLANs include: simplifying configuration operations and process modifications when users move from one location to another; re-adjusting traffic distribution when the network is congested; providing detailed reports of traffic and broadcast behavior, and Count the size and composition of the logical area of the VLAN; Provide the flexibility to increase and decrease users in the VLAN according to the actual situation.
- VLAN management
- VLAN configuration If you define VLANs based on switch ports, it is usually easy to assign one or more users to a specific VLAN with some kind of drag-and-drop software. In a non-switching environment, moving, adding, or changing operations is cumbersome. It may be necessary to change the jumper on the patch panel to move one hub port to another port. However, changing VLAN assignments still has to be done manually: in large networks, doing so is time consuming, so many networking vendors preach that using VLANs can simplify moving, adding, and changing operations.
- MAC-based VLAN assignment schemes do automate certain moves, additions, and changes. If users are assigned to one VLAN or multiple VLANs based on their MAC addresses, their computers can connect to any port on the switched network, and all traffic can reach its destination without error. Obviously, the administrator needs to perform the initial VLAN assignment, but users do not need to manually intervene in the management console when moving to different physical connections; for example, there are many mobile users' stations, they are not always connected to the same port-maybe because the office Temporarily, using a MAC-based VLAN can avoid a lot of trouble.
- What about traditional Layer 3 technology? The closest to the VLAN here is the IP subnet: each subnet requires a router port, because traffic can only move from one subnet to another subnet through a router. Because the address space provided by IP32-bit addresses is very limited, it is difficult to assign subnet addresses, and see if you are familiar with binary algorithms. Therefore, it is difficult, slow, error-prone, and expensive to perform the move, add, and change operations in the IP network. In addition, when companies change I or adopt a new security policy, it may be necessary to renumber the network, which is unimaginable for large networks.
- In fact, if someone uses an existing routed IP network with subnets and accesses any VLAN member based on the IP address, the router may be flooded with unnecessary traffic.
- If many subnets have VALN members, commonly used VLAN broadcasts must pass through routers to reach all members. In addition, the bad part is that wide-area links generate additional broadcast traffic; the number of VLAN members with a WAN connection service should generally be kept to a minimum. In fact, the VLAN membership value based on the Layer 3 address may be useful in enhancing and modifying the distribution of existing subnets. For example, two new nodes can be added to a VLAN through a full subnet, or two VLANs can be used to form a VLAN without the need to Renumber.
- Cabletron's SecureFast Virtual Networking Layer3 switching technology uses a routing server model instead of the traditional routing model. The first packet is transmitted to the routing server for regular route calculation, but the switch can remember the path, so subsequent packets can be exchanged in Layer 2 without having to check the routing table. With a VLAN based on a pure Layer 3 address, the IP address can be used as a universal network ID, allowing anyone to connect to any data link, thereby gaining full network access, greatly simplifying the task of moving, adding and changing.
- However, there are other ways to solve the management problems caused by IP subnets. Other technologies that DHCP (Dynamic Host Configuration Protocol) already assigns addresses to users when they connect can be used to solve the above problems.
WAN Network Management WAN Access Management
- In network management solutions, we know that a large network, typically a WAN, is managed through layers. For example, there are many regional network centers under a national network center. Generally, a national network center mainly guarantees the normal operation of the backbone network of this WAN, while a regional network center is mainly responsible for the access management of various network users.
- WAN access management
- Internet users need to apply for their own IP address to the regional network center, and then register the domain name in the national network center.
- (3) For the connected network users, they generally pay a one-time access fee to the regional network center, and then the regional network center configures the network access for the user.
- The corresponding configuration needs to be performed on the networked client, and then the user's network connection is opened. Finally, the networked user needs to pay the network fee according to the traffic of the network resource.
- It can be seen from the above operations that the regional network center needs to configure the access of new networked users accordingly. These configuration operations generally include:
- On the access router, select a free port, configure it accordingly, and then configure the routing information of the port according to the topology of access.
- On the access router, an Access-1ist group is established according to the user's IP address range. Once the user's request or other conditions (such as the user did not pay fees according to regulations) occur, the user's network connection can be immediately disconnected.
- (3) Add the router port and the line connecting the networked users to the set of network management and monitoring objects to ensure the reliable and stable network access service provided to the users.