0% found this document useful (0 votes)
23 views38 pages

Unit - 5

The document discusses network management and describes ManageEngine OpManager as a comprehensive network management tool. It covers key aspects of network management like fault identification, performance management, network provisioning, and quality of service. It also describes features of OpManager like automated workflows, network configuration management, and reports for capacity planning.

Uploaded by

eldorado.se69
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views38 pages

Unit - 5

The document discusses network management and describes ManageEngine OpManager as a comprehensive network management tool. It covers key aspects of network management like fault identification, performance management, network provisioning, and quality of service. It also describes features of OpManager like automated workflows, network configuration management, and reports for capacity planning.

Uploaded by

eldorado.se69
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 38

Unit-V

Network Management Program


Network management is defined as the process of managing a network for fault and performance
using various tools and technologies to keep up with the business requirements. The objective of
network management is to achieve an error free network. In today's environment,
multiple network monitoring tools or network management tools are employed making the whole
process a complex one.

Network management is complex and so network administrators need all the help they can get. A
network management solution is their best bet to streamline network management. With a myriad
of network management solutions available in the market, it becomes even more important to
zero in on the right one. Comprehensive network management solutions are to be preferred as
they help reduce the dependency on multiple tools to manage networks.

Network management solutions - Four critical


aspects
A. Fault Identification
B. Performance Management
C. Network Provisioning
D. Maintaining QoS

A. Fault identification in network management


The biggest challenge with today's network management solutions, is to proactively identify faults
before it impacts end-users. ManageEngine OpManager, the comprehensive network
management system, detects, isolates and troubleshoots faults, raises alarms to remediate faults
quickly.

ManageEngine OpManager, the integrated network management software


ManageEngine OpManager is a comprehensive network management tool with which you can
monitor the performance, availability and health of all your network devices. OpManager uses the
SNMP/WMI/CLI network protocols to fetch performance data from network devices which is then
displayed on its web client.

Using OpManager you can:

 Set multiple thresholds for performance metrics.


 Get proactively notified for threshold violations and faults through email and SMS.
 Process SNMP traps and syslogs and raise alerts.
 Automatically log alarms as tickets into a service desk software.

B. Network Performance Management


For all network management software, performance management involves troubleshooting faults
either through a manual or automated approach so that the performance of the network is
restored to its original or improved condition. OpManager offers basic and advanced network
management service to fix faults that degrade network performance. Manage network, server
and virtual machines effortlessly with ManageEngine OpManager.

OpManager troubleshoots network faults through:


 Inbuilt tools - OpManager, the network monitoring software, offers a variety of tools such
as ping, traceroute, MIB browser, remote control, and more to troubleshoot basic
performance issues.
 NCM module - OpManager includes a network configuration management module to
manage configuration changes. With this, it is easier to automate configuration backups,
adhere to compliance policies, and detect network changes in real time.

Additionally, a network assesment helps you check if your IT infrastructure is aligned with the
business goals and helps in framing a reliable network management strategy.

C.Network Provisioning
Network provisioning involves calculating the load handled by the network and future demands
based on the current network trend. It also involves keeping resources in reserve so that when a
need arises, it becomes easier to handle. A network control software would enable you to identify
network trends and effectively provision your network.

OpManager helps in resource management with:


 Capacity Planning Reports - OpManager is pre built with 150+ network management
reports that provide information on device upgrades, bandwidth usage, disk & memory
utilization etc. These reports help in identifying network trends and assist in resource
allocation.
 IP Address and Switch Port Management - OpManager's IP address & switch port
management console, helps in managing IP addresses and switch ports for space and
availability. OpManager tackles IP and switch port conflicts, audits user access and
provides prompt notifications on status changes.

D.Maintaining Quality of Service (QoS) in


network management
It is common for network performance to degrade as years pass by. Therefore, it is essential to
deliver quality IT services to end-users meet the SLA month on month. OpManager, the
automated network management tool helps you adhere to service level agreements and
achieves 99.9% availability for your network and business critical applications. With business
level dashboards, it is possible to detect the factors affecting your business in real time.
Additional network management tasks handled
by OpManager:

Workflows in network management:


Enterprise network management involves on-demand and scheduled tasks such as testing
network faults, executing backup scripts etc. Most of these tasks are repetitive and time
consuming. Automating such management tasks will help admins and technicians save a lot of
time and effort. Automated network management also helps you reduce your workforce and
enable implementation of simple automated troubleshooting techniques for your network.

For example, whenever you get a device down alarm, you will ping the device and do a
traceroute to know if there is any packet loss, where exactly it is happening or if the device is
actually down. These repetitive tasks can be automated with workflows.OpManager, the trusted
network management and monitoring tool supports around 80 actions that can be automated
with workflows.

Some of the network management tasks handled by OpManager workflows include:


 Automatically stop/restart a service or a process.
 Shutdown/restart/suspend a VM.
 Execute scripts and verify its output.
 Backup network configurations automatically.
 Detect the last changes done on a network device.

Advanced configuration management with NCM Module:


Network configurations are important for any network, and any change in them adversely impacts
the security, reliability and the quality of service provided. These changes are complex to
manage and this increases multi-fold when done manually and requires robust network
management configuration tools. According to an internal survey, nearly 50% of IT pros agreed
that changes to network configurations led to outages several times a year. In these cases, a
configuration management tool will be handy to prevent such changes in the first place or roll
back immediately.
ManageEngine OpManager's network configuration module aids in network management by
automating configuration backups, detecting network changes and ensuring that the compliance
policies are adhered to. With approval based configuration changes, administrators can be aware
of any external network changes by allowing or denying network users to make changes
to device configurations.
NCM add-on assists in network management by:
 Automating configuration backups.
 Discovering and remediating network policy violations.
 Executing scripts automatically to combat unauthorized network changes.
 Visualizing trends in device configuration changes.
 Verifying configurations/device for PCI compliance.
Database Management Software/Programs
Technically, a Database Management Systems (DBMS) are database
management tools, a uniform technology that helps
businesses optimize, manage, store, and retrieve data from main
databases. The user interface of the DBMS is a systematic approach that
can handle large chunks of data workloads.

The foundational structure of a DBMS is based on three vital elements;


data itself, database schema, database engine. The schema is responsible
for a logical structure while the engine ensures the data can be accessed,
locked, and modified by users.

Interestingly, you can also store your database information via apps.
Analogically, assume a DBMS as a bridge between your main database
and application programs. Additionally, database management software
grants you the scalability and modification options to recover, comply, or
simply monitor business operations.

The Usage of a Database Management System in the Industry

The usefulness of the DBMS is its centralized process that allows multiple
users to access data despite different geographical locations. Furthermore,
the DBMS can limit the data usage and functionality of each user. There
are different types of database softwares.

The DBMS grants end-users the freedom and convenience to store logical
or physical data. Consequently, users don't have to be concerned about
the structural changes nor the physical location of
data. Application Programming Interface (API), for instance, doesn’t bother
the developer to make manual changes. Instead, it automatically makes
modifications in the database.
Here are some database management softwares (DBMS) that can help
your business with productivity and the realization of its true potential:

Microsoft Structured Query Language


(SQL) Server
Microsoft's SQL Server is one of the most effective DBMS in existence. The
free tag of the tool certainly attracts a large user base. Its custom-built
graphical integration of best database designs has saved users' valuable
time for years. Similarly, the diagrams that you can make with the help of
this tool can be easily added to a new or existing project library.

Object Explorer feature helps end-users to view the creation of the


tables. Template Explorer, on the other hand, is a bundle of script objects
that can be used to identify numerous names in the database system. In
addition, the SQL Server creates specific containers that allow users to
combine views and scripts of a linked object or group.
Pros

 Easy to set up a new database server from scratch

 Creates various designs, tables, and view data without syntax

 Can handle complicated queries and integrate with other programs

 Creates advanced queries through Developer Network feature

Cons

 The lightweight package lacks user-friendliness in its user-interface.

 The execution of long queries often takes longer than the calculated time.

 Data maintenance becomes an issue with a selective schema.

 Desperately needs a new firewall protection system.


Cost Structure

The Express and Developer versions are free and ideal for personal
use. 2016, however, is the most popular version priced at $931 for a
Standard License. The 2017 and 2019 versions have the same price tag.

Postgre SQL
The open-source DBMS solution gets attention because of the invigorating
indexing and configuration options. Postgre SQL is ideal if your daily
business activities require you to import or export data.

As of now, Postgre SQL supports Python and JSON programming


languages. Although it is a relational database solution, users are free to
create NoSQL databases. Besides, the open-source community has
created a wide array of plug-ins to boost the functionality of the software.
Pros

 Storage and management of data in higher volumes

 Relatively secured data processing than others

 Straightforward installation process on Linux and Windows operating system (OS)

 Availability of resourceful material such as tutorials to learn the tool


 Ideal for companies that frequently deal in large volumes of data

Cons

 Native interface limits the manipulation of data.

 The advanced nature of the tool slows down the insertion of small databases.

 The installation and configuration of the software can be time-consuming.

Cost Structure

PostgreSQL is available free of cost. The distribution license of the tool


allows users to resell binaries, thanks to open source.

My SQL
My SQL is a high-speed data processing and data productivity tool with
comprehensive features. The tool is designed to increase the security and
scalability of your databases. A reliably cost-effective tool offers technical
support and counteracts potential risks. Furthermore, high-volume business
sites can deploy business-oriented complex MySQL applications.
Pros

 The newest 8.0 version has better data recovery options

 Easy to learn the foundational features without a programming background

 The open-source nature grant users complete freedom to customize data

 Well-suited for small businesses and entrepreneurs because of the low-cost structure

 Compatible with up-to-date industry's DBMS practices

 Instant integration with Apache web engines

 The data development process is adjustable for small and heavy applications.

Cons

 Queries get stuck even after a refresh or restart

 There is overdependence on third-party add-ons


 Data operations in Linux OS can get complicated.

Cost Structure

Amazon RDS
Amazon RDS (Relational Database Service) is one of the best DBMS
tools. It has a dedicated secured connection, and it automatically backs up
your data through an inbuilt feature. Furthermore, it can resize your entire
database activities.
Pros

 Users can process the heavy workloads in a single database.

 You have to pay for the used resources.

 It can get you access to MySQL, Oracle, or Microsoft SQL databases.

 Point-in-recovery attracts programmers who want flexibility and scalable storage

options.

Cons

 It has limited auto-scale options.

 Unavailability of access to physical server to check server logs.

Cost Structure

Users are free to try out Amazon RDS. In fact, there's no minimum criterion
to use the tool. You can pay for the availed resources via On-Demand
method. It may sound complicated, but you can instantly calculate your
monthly bill with the AWS Simple Monthly Calculator.
Microsoft Access

Microsoft Access works solely on Windows OS. It's a great tool to create
custom databases in numerous formats as per your business needs. The
affordable database management system is useful in the IT sector.
Pros

 Custom templates of Microsoft Access are ideal for adding web databases and

simultaneously tracking, reporting, or sharing with other users

 Users get to have full access to Office Suite Packages such as Word, Excel, and

Outlook.

Cons

 License extension to integrate third-party tools can take time.

SQL Developer
The open-source DBMS tool is a favorite of developers as one of the
efficient DBMS tools to design, develop, and perform other database
management activities. The best trait of SQL Developer is that it takes less
time to execute multiple queries. Consequently, users generate queries in
numerous formats like PDF, HTML, XML, or Excel.
Pros

 It allows users to simplify data management in Oracle Database

 SQL Developer can run end-to-end database applications

 You can migrate your database modeling solution to third-party databases to Oracle

Cons

 Automation of an operating system often changes database queries


Cost Structure

The SQL developer is free to use and download for users.

Informix
Informix Dynamics Server is a commercial DBMS tool that is perfect for
businesses that want parallel and multi-threaded processing of data. The
scalability of the software makes it ideal, plus it has a great in-depth
support option.
Pros

 It's Online Transactional Processing (OLTP) performance is better than others

 Flexibility to scale small systems to multi-layered distributed nodes

 It can merge relational data in a time series

Cons

 The top edition is expensive for small businesses.

Cost Structure

The price of the tool is essentially decided on the quantity of data you want
to back up

Advanced Query Tool


As the title suggests, the Advanced Query Tool is mainly used by database
administrators and developers to handle complex data management
activities.
Pros

 Database objects are displayed in a structured tree to make logging easier

 Creatively add descriptions to each object

 You can highlight queries and charts

Cons

 Table joints feature to build advance queries requires a professional touch

Cost Structure

Its price is calculated on the volume of licenses.


Conclusion
Whether you are a non-professional user or an experienced developer,
your main focus of interest to choose from the DBMS mentioned above
should be based on monitoring and performance generation. Also, check
the flexibility of the program to add end-users. A good method is to
compare the integration of data queries and assess technical possibilities
that can enhance your database scripting knowledge. Ultimately, the role of
the user should be the criterion to select your database management
system software.
Server
What is a server?

A server is a computer or system that provides resources, data, services, or programs to other
computers, known as clients, over a network. In theory, whenever computers share resources
with client machines they are considered servers. There are many types of servers, including
web servers, mail servers, and virtual servers.
An individual system can provide resources and use them from another system at the same
time. This means that a device could be both a server and a client at the same time.
Some of the first servers were mainframe computers or minicomputers. Minicomputers were
much smaller than mainframe computers, hence the name. However, as technology
progressed, they ended up becoming much larger than desktop computers, which made the
term microcomputer somewhat farcical.

Initially, such servers were connected to clients known as terminals that did not do any actual
computing. These terminals, referred to as dumb terminals, existed simply to accept input via
a keyboard or card reader and to return the results of any computations to a display screen or
printer. The actual computing was done on the server.

Later, servers were often single, powerful computers connected over a network to a set of
less-powerful client computers. This network architecture is often referred to as the client-
server model, in which both the client computer and the server possess computing power, but
certain tasks are delegated to servers. In previous computing models, such as the mainframe-
terminal model, the mainframe did act as a server even though it wasn’t referred to by that
name.

As technology has evolved, the definition of a server has evolved with it. These days, a server
may be nothing more than software running on one or more physical computing devices.
Such servers are often referred to as virtual servers. Originally, virtual servers were used to
increase the number of server functions a single hardware server could do. Today, virtual
servers are often run by a third-party on hardware across the Internet in an arrangement called
cloud computing.
A server may be designed to do a single task, such as a mail server, which accepts and stores
email and then provides it to a requesting client. Servers may also perform several tasks, such
as a file and print server, which both stores files and accepts print jobs from clients and then
sends them on to a network-attached printer.

How a server works


To function as a server, a device must be configured to listen to requests from clients on a
network connection. This functionality can exist as part of the operating system as an
installed application, role, or a combination of the two.

For example, Microsoft’s Windows Server operating system provides the functionality to
listen to and respond to client requests. Additionally installed roles or services increase which
kinds of client requests the server can respond to. In another example, an Apache web server
responds to Internet browser requests via an additional application, Apache, installed on top
of an operating system.
When a client requires data or functionality from a server, it sends a request over the network.
The server receives this request and responds with the appropriate information. This is the
request and response model of client-server networking, also known as the call and response
model.

A server will often perform numerous additional tasks as part of a single request and
response, including verifying the identity of the requestor, ensuring that the client has
permission to access the data or resources requested, and properly formatting or returning the
required response in an expected way.

Types of servers
There are many types of servers that all perform different functions. Many networks contain
one or more of the common server types:
File servers

File servers store and distribute files. Multiple clients or users may share files stored on a
server. In addition, centrally storing files offers easier backup or fault tolerance solutions than
attempting to provide security and integrity for files on every device in an organization. File
server hardware can be designed to maximize read and write speeds to improve performance.
Print servers

Print servers allow for the management and distribution of printing functionality. Rather than
attaching a printer to every workstation, a single print server can respond to printing requests
from numerous clients. Today, some larger and higher-end printers come with their own
built-in print server, which removes the need for an additional computer-based print server.
This internal print server also functions by responding to print requests from a client.
Application servers

Application servers run applications in lieu of client computers running applications locally.
Application servers often run resource-intensive applications that are shared by a large
number of users. Doing so removes the need for each client to have sufficient resources to
run the applications. It also removes the need to install and maintain software on many
machines as opposed to only one.
DNS servers
Domain Name System (DNS) servers are application servers that provide name resolution to
client computers by converting names easily understood by humans into machine-readable IP
addresses. The DNS system is a widely distributed database of names and other DNS servers,
each of which can be used to request an otherwise unknown computer name. When a client
needs the address of a system, it sends a DNS request with the name of the desired resource
to a DNS server. The DNS server responds with the necessary IP address from its table of
names.
Mail servers
Mail servers are a very common type of application server. Mail servers receive emails sent
to a user and store them until requested by a client on behalf of said user. Having an email
server allows for a single machine to be properly configured and attached to the network at
all times. It is then ready to send and receive messages rather than requiring every client
machine to have its own email subsystem continuously running.
Web servers

One of the most abundant types of servers in today’s market is a web server. A web server is
a special kind of application server that hosts programs and data requested by users across the
Internet or an intranet. Web servers respond to requests from browsers running on client
computers for web pages, or other web-based services. Common web servers include Apache
web servers, Microsoft Internet Information Services (IIS) servers and Nginx servers.
Database servers

The amount of data used by companies, users, and other services is staggering. Much of that
data is stored in databases. Databases need to be accessible to multiple clients at any given
time and can require extraordinary amounts of disk space. Both of these needs lend
themselves well to locating such databases on servers. Database servers run database
applications and respond to numerous requests from clients. Common database server
applications include Oracle, Microsoft SQL Server, DB2, and Informix.
Virtual servers

Virtual servers are taking the server world by storm. Unlike traditional servers that are
installed as an operating system on machine hardware, virtual servers exist only as defined
within specialized software called hypervisor. Each hypervisor can run hundreds, or even
thousands, of virtual servers all at once. The hypervisor presents virtual hardware to the
server as if it were real physical hardware. The virtual server uses the virtual hardware as
usual, and the hypervisor passes the actual computation and storage needs onto the real
hardware beneath, which is shared among all the other virtual servers.
Proxy servers

A proxy server acts as an intermediary between a client and a server. Often used to isolate
either the clients or servers for security purposes, a proxy server takes the request from the
client. Instead of responding to the client, it passes the request on to another server or
process. The proxy server receives the response from the second server and then replies to the
original client as if it were replying on its own. In this way, neither the client nor the
responding server needs to directly connect to each other.
Monitoring and management servers

Some servers exist to monitor or manage other systems and clients. There are many types of
monitoring servers. Several of them listen to the network and receive every client request and
server response, but some do not request or respond to data themselves. In this way, the
monitoring server can keep track of all the traffic on the network, as well as the requests and
replies of clients and servers, without interfering with those operations. A monitoring server
will respond to requests from monitoring clients such as those run by network administrators
watching the health of the network.

Server structures
The concept of servers is nearly as old as networking itself. After all, the point of a network is
to allow one computer to talk to another computer and distribute either work or resources.
Computing has evolved since then, resulting in several types of server structures and
hardware.
Mainframe or minicomputer (AS/400)

You could say that the original servers, mainframe computers, and later, minicomputers,
handled almost all computing tasks except the interaction with the user through a screen and
keyboard, which was left to the client system.
Computer hardware server

The next major wave of servers included computer-based servers. In many respects, these
servers were nothing more than larger, more powerful desktop computers. Such servers were
generally more expensive and held far more memory and disk space than most client
computers. Each server was still a self-contained unit with its own motherboard, processor,
memory, disk drives, and power supply. Servers like this were often warehoused in air-
conditioned rooms called server rooms, and were later bolted into racks for better storage and
accessibility.
Blade servers

The original computer server hardware was large and stored in racks that could hold hundreds
of pounds. Over time, however, faster means of connecting hardware resulted in parts of the
server being extracted from a single self-contained device. By removing hard drives,
eliminating internal cooling, and the ongoing miniaturization of computing parts, servers
were eventually reduced to a single thin server known as a blade server. While still stored in
racks in server rooms, blade servers are smaller and can be replaced more easily.
Combining servers

Even before virtualization, servers were being extracted from the standard model of a single
server operating system installed on a hardware machine. Technology, such as network-
attached storage, removed the need for a server to have its own storage. Other technologies,
such as mirroring and clustering, enabled pieces of hardware to be combined into larger,
more powerful servers. Such a server might consist of several blades, several attached storage
devices, and an external power supply, and each piece could be swapped out for another
while the server was still running.
Virtual servers

Virtual Servers still require hardware, but that hardware now runs a different process known
as a hypervisor. In some cases, such as Microsoft’s Hyper-V, a full operating system
continues to run on the hardware itself. In other cases, so-called bare-metal hypervisors can
be installed directly onto server hardware. In both instances, the hardware itself is often
spread across an array of blade servers, networked storage, and power supply, resulting in an
environment where it is impossible to tell where any individual server ends and another
begins.

Examples of server operating systems

Microsoft Windows servers

An argument can be made that Windows for Workgroups was Microsoft’s


first server operating system. In that version, certain computers could be set
to share resources and respond to requests from clients, which made them
servers by definition. Microsoft’s first real server operating system was
Windows NT. Its 3.5 and 3.51 versions ran on many business networks until
Microsoft released its Windows Server line that continues to exist today. The
most current Windows Server version is Windows Server 2016. This version
supports numerous applications and databases as well as a hypervisor that
allows virtual servers.

Linux / Unix servers

The other major player in server operating systems is the Linux/Unix realm.
There are multiple versions and flavors of Linux/Unix including Red Hat
Enterprise Linux, Debian, and CentOS. As an open-source operating system,
Linux is very popular as a web server, often with the Apache web application
server installed.

NetWare

Although no longer made, NetWare was a major player in the server software
space as the client-server era was ramping up. Eventually, NetWare moved
its server operating system to a Linux-based kernel and named it a Novell
Open Enterprise Server (OES).

Cloud servers

Virtual servers hosted on a third-party infrastructure on an open network,


such as the Internet, are called cloud servers. There are numerous cloud
server providers these days, including Google’s Cloud Platform, Microsoft
Azure, and IBM Cloud.
However, the main pioneer of corporate cloud computing was Amazon’s AWS
platform. It originally started using spare capacity of Amazon’s own servers
and networks, but AWS now allows customers to create a virtual server nearly
instantly and then adjust the amount of resources that server may use on the
fly.
Today, a server can be nothing more than the data of physical hardware that
consists of multiple processors, disk drives, memory, and network
connections. But, even now, a server is still just a system that responds to a
request from a client.

Operating System Utilities


Many operating systems provide utilities to administer and
troubleshoot. Most of the operating systems provide context sensitive
help to use the tools.

We have seen that the fundamental purpose of the operating


system is to manage the various system resources. We have
also examined the human computer interface which allows us
to interact with the operating system. There is, however, a
significant body of software that, while not strictly part of the
operating system itself, cannot be described as application
software. This software is often bundled with the operating
system software, and comes under the general heading
of utility software.

Utility software can include file re-organisation utilities,


backup programs, and a whole range of communication
services. Many of the utilities that are bundled with a
particular operating system are installed by default, although a
significant number are optional and must be explicitly selected
for installation.

The number and type of utility program provided varies from


one operating system to another, but common examples
include facilities to partition and format hard drives and floppy
disks, file encryption and compression utilities, and task
scheduling programs. These utilities are often implemented as
stand-alone programs and can be run by the user in much the
same way as an application program. In many cases, there are
a number of proprietary utility programs on the market that
carry out the same tasks, but with additional value added
features.

Windows Operating System Utilities


You can use the following Windows operating system utilities to
monitor Vector:
•Windows Diagnostics
•Windows Performance Monitor
•Windows Event Viewer
•Windows Registry Editor
•Windows Task Manager

For a full description of the Windows utilities, see your Windows


documentation.

Windows Diagnostics
The Windows Diagnostics program can help you determine your
operating system’s configuration. This tool can be found in Control
Panel, System and Security, Administrative Tools, Computer
Management.

Windows Performance Monitor


Performance Monitor is a Windows graphical tool for measuring the
performance of your own computer or other computers on a network.
On each computer, you can view the behavior of objects such as
processors, memory, cache, threads, and processes. Each of these
objects has an associated set of counters that provide information on
such things as device usage, queue lengths, and delays, as well as
information used for throughput and internal congestion
measurements.
It provides charting, alerting, and reporting capabilities that reflect
current activity along with ongoing logging. You can also open log
files at a later time for browsing and charting as if they were
reflecting current activity. To monitor performance on Windows, see
the operating system documentation.
Windows Event Viewer
Event Viewer is a tool for monitoring events in your system. You can
use Event Viewer to view and manage System, Security, and
Application event logs. To access the Event Viewer, right-click on the
Computer icon and select Manage. The Computer Management
Window is displayed. The Event Viewer is available under the
System Tools.
Windows Registry Editor
This program can be used to view the system configuration and
environment. For a description of how the information is presented
and the capabilities of the utility, see the online help.
To start the Registry Editor
1.Open a Windows command prompt.
2.Type REGEDT32. The Registry Editor opens.

Windows Task Manager

The Task Manager enables you to monitor and control your computer
and what is running on it. It shows you programs and processes that
are running as well as performance. To access the Task Manager,
right click an empty area in the task bar and click Start Task Manager.

System Performance Monitor (SPM)


A system performance monitor primarily collects and reports key performance
indicators and metrics into the operational state of a system. Most operating systems
have a native SPM application/component that displays factual and graphical stats
for system performance. Some of the performance metrics/data collected by an SPM
include the use of the CPU, memory, hard disk and network. It also includes the
ability to provide suggestions and guidelines toward improving performance and
tuning/optimizing the system automatically. SPM is a key tool in any system
administrator's job because it provides system-wide insight and aids in decision-
making.
For example, a system might have an over-utilized CPU/memory and based on past
trends provided by the SPM, a system administrator can schedule a system upgrade
accordingly.

Network Security and


Performance Monitoring: The
Basics
Network Performance Monitoring
In order to properly run a network in your business, you need to understand that
network’s performance. Gathering data on your network and monitoring for any
performance issues is a key factor in operating a network. Observing network
performance involves having the right tools and practices in your enterprise’s network
monitoring plan. One way businesses can determine their network performance is
through a network performance test.

Network performance tests are designed to gather information about a network,


specifically in regards to how certain factors are affecting performance. Your
company can test your network for a variety of performance-related issues and
examine their effect on the network. This can range from specific performance
metrics such as bandwidth and throughput to more general tests for network
security and malfunctioning hardware. Read on to discover more about network
performance testing and why they’re necessary for your enterprise.

The various types of network performance tests


Network performance testing includes a wide spectrum of network evaluations
that determine how specific factors influence performance. Each test examines
network performance from a different angle, and the best performance analysis
considers the results of multiple performance test types. Some of the most
common performance tests include:

Network availability test


By sending signals through a network and the nodes connected to it, an
availability test ensures that every piece of network hardware in your infrastructure is currently
operational. This is usually done by something as simple as a ping test, which asks
for responses from all your network devices.

Network speed test


Speeds tests check the upload and download speeds of your network by
sending/asking for data. A speed test might also examine throughput and packet
loss to weigh the upload and download speeds against other performance
metrics.

Bandwidth usage test


Depending on your network’s specs, you have a set amount of bandwidth that can
be used at one time. Determining how that bandwidth is allocated tells your
network how effectively its resources are being utilized. This test can also factor
into a quality of service (QoS) tool by indicating which network applications are using
the proper resources.

Penetration test
Your network needs to be secured, and penetration tests allow you to find gaps in
your network’s security. By examining for security gaps, your enterprise will know
the areas where security breaches are likely to come from. These insights allow
you to take steps to patch gaps, either by replacing hardware or updating security
protocols.
Test your network routinely and continuously
Network performance can change dramatically in a matter of seconds. Factors
such as hiding threat actors or sudden hardware failure can bring performance
levels down instantly. If your network team isn’t made aware of these issues
immediately, they’ll be blind to major network issues. Thus, the need to
continuously and routinely perform network tests is vital to your company.

NPM tools are constantly checking your network for performance issues and can
automatically administer scheduled network tests for you. These tests can also
be performed outside business hours so your team is alerted to any major issues
that happen overnight. Performing regular tests keeps your enterprise up-to-date
on your network’s performance so you can eliminate the need to base your
network strategy on performance assumptions.

Network Security Monitor

Any business that maintains a network or series of networks in its infrastructure


needs to keep network security in mind. Enterprises use networks to deliver data,
files, applications, etc. from one location to another. The information that travels
through a network is, more often than not, business-critical or sensitive. If
something happens to that data as it crosses the network, it could potentially
compromise the network, any devices connected to it, or your entire business.

Devising effective security plans for your network means incorporating the right
tools and practices to keep your network safe. Security threats are not just
dangerous to your enterprise’s safety, but they can also be a key influence on a
network’s performance. Malware can slow network speeds and disable devices
and nodes installed on your network. Below, we outlined the basics of network
security and how network performance monitoring can help keep your networks safe.

How security threats affect network performance


A network’s performance can be affected by a number of different factors,
and security threats are no exception. If your network infrastructure isn’t secure, harmful
actors may enter your network and target specific network functions or devices.
If these areas of the network become unavailable, your network performance will
inevitably suffer as a result. Some of the ways network performance can be
affected by security problems include:

Overloading the network


A security attack might be design to either strain or eliminate a network’s
resources. Once malware enters the network, it may continuously send requests
for data to deliberately use up your available bandwidth. The severity of an attack
like this could range from slowing the network down to a full-scale denial-of-
service (DoS) attack. Whatever the intent, excessive or harmful data usage will
put a huge strain on your network’s performance. Without the right security
resources in place, your network will have to work hard to keep up.

Another way security threats can overload your network is by installing resource-
draining applications and leaving them to use up bandwidth. A network
performance monitoring (NPM) solution can sweep for any unwanted software and
alert your team to it so you can take steps to remove it from your infrastructure.

Disabling devices
Security threats can target any hardware on your network’s infrastructure.
Malware might try to bring down either devices connected to the network or the
network nodes that you have installed. Security breaches can disable devices
through numerous methods, and nonoperational hardware means that your
network has less physical resources to rely on for data transmissions.

Data destruction
Your network creates and stores a ton of data on a daily basis which devices on
the network constantly wants to access. This data is usually essential to your
business and, as such, is a prime target for security threats. Malware can
intercept and destroy data on a network, either as it travels from node to node or
as it waits on a device.

Reconfiguring access control


Network teams need to define access control parameters in order to prevent
unauthorized access to sensitive information. Security threats, if they’re on your
network, can attempt to reconfigure those parameters to allow for easier access
to that information. The threat actors might then deliberately request that
information or make it inaccessible to your enterprise.

Multi-layered network security strategies


Companies must protect their networks and the data that flows through them. This
protection should cover both outside threats attempting to invade the network
alongside internal security gaps. Security threats could come from anywhere –
external or on-site hackers, unsecured devices, and even employees misusing
your network. Enterprise networks can be massive and complex, and each
installation needs to comply with the same security protocols across your entire
infrastructure.

A multi-layered network security plan incorporates security protocols and tools


that attack incoming security threats and search for hidden ones. By combining
both attack and passive security monitoring, you can ensure that your business
defends against network attacks and discovers harmful actors lying in wait to
strike. Your company should employ both perimeter and endpoint security tools to
keep incoming threats from reaching the rest of your network. However, it also
needs to secure its network internally by examining devices and nodes. A
network can never be 100% secure, but establishing a defense against multiple
attack vectors prepares you against actors that affect your network performance.
How can a network monitoring solution improve security?
An enterprise can deploy multiple different technologies to improve their network
security. These technologies help protect the network from dangerous attackers
and examine for any warning signs that indicate a security breach or threat. A
network performance monitoring (NPM) solution improves security by constantly
check the performance levels of your network. This includes monitoring
bandwidth usage, examining traffic flow, and checking the status of devices and
nodes.

Reporting unusual traffic levels


One of the telltale signs of malware on your network is spikes in data traffic. Your
NPM tool should have a baseline established so it knows what your regular network
performance is. This includes knowing how much data typically flows through the
network, including between particular points. With this baseline, the NPM can
detect abnormal (and potentially harmful) data traffic on your network more easily

Device monitoring
If a security threat is specifically designed to disable devices and nodes, you
need a solution that constantly checks on the state of the hardware on your
network. Most NPM tools are equipped to monitor device health and operations,
allowing your enterprise to keep its hardware in line. An NPM solution might ping
every device and node from time to time to ensure the device is functioning. If it
doesn’t receive a response, it can flag the network team to investigate for
hardware failure.

Data packet capturing and analysis


As part of their performance monitoring functions, NPM solutions can copy data
packets that travel through a network and analyze them. This helps them identify
performance issues, such as packet loss or low throughput. It can also be used to
find security threats on the network by scanning for harmful activity or suspicious
data.

Managerial considerations in
Software Selection
Managerial consideration in Software Maintenance

Software Maintenance
Software maintenance is a part of the Software Development Life Cycle. Its primary
goal is to modify and update software application after delivery to correct errors and
to improve performance. Software is a model of the real world. When the real world
changes, the software require alteration wherever possible.

Software Maintenance is an inclusive activity that includes error corrections,


enhancement of capabilities, deletion of obsolete capabilities, and optimization.

Need for Maintenance


Software Maintenance is needed for:-

o Correct errors

o Change in user requirement with time

o Changing hardware/software requirements

o To improve system efficiency

o To optimize the code to run faster

o To modify the components

o To reduce any unwanted side effects.

Thus the maintenance is required to ensure that the system continues to satisfy user
requirements.
Types of Software Maintenance

1. Corrective Maintenance
Corrective maintenance aims to correct any remaining errors regardless of where
they may cause specifications, design, coding, testing, and documentation, etc.

2. Adaptive Maintenance
It contains modifying the software to match changes in the ever-changing
environment.

3. Preventive Maintenance
It is the process by which we prevent our system from being obsolete. It involves
the concept of reengineering & reverse engineering in which an old system with old
technology is re-engineered using new technology. This maintenance prevents the
system from dying out.

4. Perfective Maintenance
It defines improving processing efficiency or performance or restricting the software
to enhance changeability. This may contain enhancement of existing system
functionality, improvement in computational efficiency, etc.
Software controlling and Replacement
Software control is the process of the physical storage in a
definitive software library of all software to ensure that only correctly
released, licensed, and authorized versions of software are in use. Processes
in this category include the tracking of releases, patches, service packs, and
bug fixes.
Software Quality Control (SQC) ensures the task of achieving and maintaining the
quality in a software product. It may be seen as a set of activities that are being
carried out with the aim of achieving quality from each different perspective in a
software product. These activities may consist of tracing, identifying, removing and
correcting of maximum number of possible bugs or defects in the software. In short,
SQC consists of different testing activities along with some other activities,
comprehensively to control and achieve the desired level of quality in a product.

SQC Strategy:PDCA Cycle


Generally, SQC follows a defined strategy, namely PDCA cycle i.e. Plan, Do, Check
and Act for controlling the quality.

 Plan: This involves the defining of objectives and planning of carrying out different
quality control activities.

 Do: It is related to the implementation and execution of the plans.

 Check: Study and analyse the results generated and comparing it with the expected
result to check the deviations (if any) in the results.

 Act: At this stage, corrections are carried out and applied; if needed to meet the
objectives defined during plan phase. The cycle continues to be repeated several
times until the achievement of expected quality.
SQC is Much More than Testing
The process of quality control is not limited to testing only. Apart from testing, SQC
includes reviews and analysis. These reviews and analysis may be applicable to
requirement, planning, design, test cases, and many other things.

Testing techniques
Testing is an important component of the SQC for verifying and validating the
specified requirements in the developed software. There are numerous testing
methods available for carrying out the testing task for different-different needs. Some
of them are :
 Unit testing.
 Functional testing.
 Integration testing.
 System testing.
 Acceptance testing.
 Beta testing.
 Performance testing.
 Regression testing.
 Volume testing.
 Recovery testing.
 Usability testing.
 Stress testing.
 Load testing.
 Installation testing.
Software Replacement
How long have you been using your current Business Software System? Does it meet your
current requirements? Does it need to be replaced? These are excellent questions, but do you
really know without a doubt that you need to make a change? If you are like most firms, the
signs are not so obvious unless you ask yourself and the people within your organization. If
you are like most firms, you have been plodding along, making do with your current Business
Software System. People tend to accept reality as the norm. You get used to your current
Business Software System and do your work within the confines of the capabilities of your
current system.

You know your current Business Software System isn’t perfect, but rationalize that it’s no
better or worse than any other Business Software System. People may complain that it takes
too much time to complete transactions (e.g. enter sales orders), or that too much work has to
be done manually to support requirements the current system cannot really meet effectively,
or the system cannot generate needed reports because there are insufficient data fields, or
maybe critical planning and operations control is just too difficult.

Every Business Software System will deteriorate over time, even systems you purchase
today. The underlying issue may be software related, but in many cases firms simply
outgrow the capabilities of their current system. Firms change over time. Growth and
expansion into new markets are the primary change motivators, but it is possible that your
current Business Software System has not kept up with market demands. The reasons aren’t
really that important, but your failure to recognize that it’s time to change is the real issue. If
you wait until you can no longer compete in your market effectively, then it’s too late. If you
constantly evaluate the performance of your Business Software System and anticipate
change, then you will be able to stay ahead of the race to remain competitive.

The decision to replace your current Business Software System isn’t a black or white
question. It’s based more on an accumulation of issues that at some point tip the balance.
Rather than waiting until you are forced to replace your current Business Software System,
adopt a proactive approach whereby you are constantly evaluating your current accounting or
ERP system. This doesn’t necessarily mean you need to replace your current system every
year. If you are going to remain competitive, you have to conduct something you might call
an Annual Business Checkup. The concept is similar to an annual physical. Rather than
waiting for physical deterioration, you should visit your doctor on a regular basis. Submit
yourself to a battery of tests that either confirm your state of health or indicate that a physical
issue is beginning to develop. Evaluating your current Business Software System follows the
same rational. Ask yourself on a formal basis what works and what isn’t working as well as
what you require to improve your competitive position. If you follow this path, you will be
able to determine when you need to change and just as importantly what your Business
Software System needs to do to support your quest for excellence.

A replacement of software replaces an existing software system with a new custom-built

system, a commercial off-the-shelf (COTS) system, or a hybrid of those. Most replacement

software share some common challenges, including stuffing in unnecessary functionality,


degrading the organization’s operational performance, users refusing to adopt the new system,

and having such a large project that it never deploys. Focusing requirements practices on these

issues directly can increase the likelihood of a successful system replacement software.

Why Replace?

Replacement of software might be implemented to improve performance, cut costs, take

advantage of modern technologies, or meet regulatory requirements. The main focus of

replacement of software is to migrate existing functionality.

Replacement of software often originate when stakeholders want to add functionality to an

existing system that is too inflexible to support the growth or has technology limitations. Use

the anticipated cost savings from a new system (such as through reduced maintenance of an

old, clunky system) plus the value of the new functionality to make sure you can justify a

system replacement project.

Business Software System Evaluation Process

Analyzing and improving your current Business Software System isn’t just a matter of asking
and answering a series of specific questions. That just leads to a fractured series of required
improvements. Your analysis will certainly lead to the specification of very specific
improvements, but you have to first define what you need to do very well as a firm to
compete effectively in your industry. That highly detailed “picture” can then be used to
determine precisely what your Business Software System should do to support your quest for
competitive excellence.

1) Vendor / Product / Reseller Failing

This is perhaps the easiest sign that you need to replace your current Business Software
System and it is the most urgent in terms of reaction on your part. If the vendor is not
updating their Business Software System on a regular basis or is not providing adequate
support, this may be a signal that either the vendor itself is starting to suffer financial
difficulties or they have decided that their Business Management System can no longer
remain competitive. If this is the case, you should accept the fact that change is mandatory.

If you are not receiving adequate support from your local reseller, but the product itself
appears to be solid (i.e. it’s still competitive), you may need to search for a replacement
reseller. This is your absolute right and as long as you can find a knowledgeable reseller who
really wants to work with you, you should not necessarily scrap your current Business
Software System. This doesn’t necessarily mean you shouldn’t replace your current Business
Management System. Maybe this is an opportunity to look at alternate products.

2) Your Business Software System does not adequately support the needs of your
customers.

The key to your business success is attracting prospects, converting them to customers and
then holding this relationship into the future. You must meet each customer’s expectations
and business process requirements so they will continue to order from you. Your Business
Software System will give you the information and functionality that will enable you to
provide your customers the best possible experience. If your Business Management System
cannot adequately meet the needs of your customers, this may be an indication that you need
to make a change.

3) Your CRM system does not adequately support your marketing and sales
strategies.

Most people think in terms of “sales and marketing”, but that approach is really backward.
Your must first attract “new blood” and then sustain that relationship. Marketing is all about
attracting prospects and sales is all about closing the deal and keeping the deal closed. Your
CRM system must help you do both. If your CRM system is not seamlessly integrated with
your Business Software System or if your CRM system does not assist you attract and hold
customers, it may be time for you to either find a CRM system that integrates with your
Business Software System or find a Business Software System that integrates with your
current CRM system.

4) You will be competing in a new industry.

If you are expanding into a new industry (e.g. manufacturing) and you current Business
Software System does not support critically required functionality, you must replace your
current system. This decision should be viewed as mandatory as well as proactive in that you
should make no move into the new industry unless your Business Software System supports
the functionality you need to compete effectively.

5) You will be acquiring a new company or opening new offices.

You current Business Software System may support operating from a single location or
operating as a single unique legal entity, but what if you open offices in remote locations or
acquire a company that operates from a different location or competes in a different
industry? As we discussed the issues surrounding an expansion into a new industry, you
must proactively determine the structure and functionality requirements if you open new
offices or acquire another company. If your current Business Software System does not
support these expanded business requirements, you must determine if you need a new system
before these corporate changes take place.

6) You cannot complete business activities and tasks effectively and efficiently.
Once you receive a customer’s order for products or services, how do you then record,
monitor and complete the customer’s order and do so for the lowest possible cost (least cost =
maximum margin)? That’s where the notion of effectiveness and efficiency come into play.
You need to give custom’s what they want (appropriate products and services at the right
price, on-time delivery, quality and communications). You also need to complete each order
as efficiently as possible. Your Business Software System must first help you meet the needs
of your customers (effectiveness) and then help you complete business transactions at the
lowest possible cost (efficiency). If it takes too long to complete business tasks, you may
need to search for a new Business Management System that supports business effectiveness
as well as business efficiency.

7) Employees must resort to manual tasks to accomplish their job assignments.

Business Software Systems should help people do their jobs efficiently, but that’s not always
the case. In many cases people have to resort to manual tasks and that’s inherently inefficient
and ineffective. A prime example is tracking and collecting overdue invoices. While all
systems produce an Aging Report, everything an employee has to do after that point is
manual. As you are evaluating your current Business Software System, identify every single
manual task and determine whether this task can be supported by a software application that
seamlessly integrates with your Business Software System.

8) You can no longer adequately control your operations.

Completing business tasks efficiently is certainly important (e.g. recording and completing
sales orders or manufacturing orders), but there are any number of activities that will help
you run your business more efficiently. Maintaining inventory ensures that products will be
available when orders are placed. Planning production operations ensures that each step in
the production process will be scheduled at the right time with the right material by the
appropriate workgroups. All of these diverse activities need to be coordinated and the only
way this can be accomplished is via some form of software supported operations
management systems. The question you must answer is whether your current Business
Software System can give you the operations support you need.

9) Your current system does not support effective business decision making.

Software supported planning and execution functions help you record orders and control
operations so that each order is completed in a timely manner, but that doesn’t help you
understand where you are and where you appear to be going. As an example a distributor
needs to ship orders, but controlling inventory levels is one of the keys to your success.
Tracking inventory turns will help you understand if you have too much inventory or too
little. While it’s possible to create reports that calculate inventory turns, you may have 5,000
or more separate inventory items to track and that’s going to require a lot of time.

You could sort the calculated inventory turns to create a list that helps you concentrate on
only those items that require your attention, but a single value really doesn’t give you a
complete picture. You need a graphical representation of inventory turns for (as an example)
each of the past twelve months. Now you are building a picture of your operations that will
help you understand where you have been, where you are today and possibly even where you
appear to be heading. You could also define for each month where you need to be. The
creation of what you could call a budget vs. actual representation of inventory turns will give
you all of the information you need to control inventory more effectively.

While this discussion is somewhat detailed, the key concept is creating a business decision
making system that helps you identify where you need to concentrate your efforts. It starts
with the identification of the key business drivers or Key Performance Indicators (KPIs) that
affect your business. If you don’t really know what’s critical to your success, then all of the
rich data that can be extracted from your Business Software System will be useless. Forget
about row and column reports, pie charts and bar charts. They represent just a snapshot of
your firm at a single moment in time and effective decisions should never be based on a
single data point. Adopt instead a graphically based reporting system that helps you become
more proactive when it comes to business decision making.

As you are evaluating your current Business Software System, take whatever time is required
to define precisely what information you need to make sound business decisions and the
format whereby this information can be most effectively displayed. If your current Business
Software System cannot give you the information you require, then this may be a strong
indication that change is required.

10)You are not taking advantage of current technology and functional possibilities.

The functional and technological capabilities of Business Software Systems have grown
significantly over the past five years. Your current Business Software System may not
support all of these new capabilities or it may but you haven’t adopted them yet. The fact
that you can do something doesn’t necessarily mean you have to stay on the cutting edge. As
you are evaluating your current Business Software System, ask yourself if you should move
to the Cloud, or access systems from any device anywhere, or collaborate with employees
and even customers, or utilize workflow, or adopt exception management or task
management. Once again you will need to place yourself in a learning mode so you can
understand these technical and functionality possibilities and whether they may be useful.
Don’t buy into the latest and greatest. Prove to yourself and your employees that each of
these changes are logical, cost effective and will help people become more efficient or
effective.

Knowledge is the Key to Business Software System Excellence

One of the least known signs that your Business Software Systems may need to be replaced is
a lack of knowledge of what’s possible in terms of today’s functional and reporting
capabilities. If you are going to thoroughly evaluate your current Business Software System,
you have to identify the strengths and weaknesses of the system as it exists today. In addition
you need to identify what’s possible in terms of capabilities with which you may have no
current knowledge but which could assist you become more successful. Knowledge is one of
the keys to the success of any software evaluation process.
Before you launch this project, invest time educating yourself. Read industry publications
that may shed some light on products and capabilities that might be of interest. Identify
several products that seem to have developed a following in your market. Learn more about
these products. Talk to several software vendors. Ask them what they think may be of
interest to you and your firm, but don’t add these capabilities to your list of “must haves”
simply because one or more products provide such functionality. Once you have educated
yourself, you can launch a far more effective evaluation of your current system.

Create a Continuous Competitive Evaluation and Improvement Plan

What do you need to do very well in order to compete effectively in your market(s)? Forget
about specific software functionality. Instead, look at your firm as a single entity and
evaluate your ability to capture your fair share of the market(s) in which you compete. This
analysis has nothing to do with running your business efficiency and generating profits. It’s
all about generating revenue and that should be your sole focus. This competitive analysis
should be a “document” that is updated continuously. Rather than launching a massive
competitive analysis of your firm every year (as an example), key executives and line of
business managers need to know precisely where they are every day. If you don’t know
where you are, how can you possibly compete more effectively? Small adjustments are much
easier to implement than massive change that disrupts your business processes and your
employees.

There are actually two forms of planning you should consider. The previous section dealt
more with short-term planning (say two years) and this question can be thought of as more of
a strategic planning initiative. Strategic planning deals with “what-ifs?” that may or may not
occur. This doesn’t mean you should ignore these possibilities. In essence you need to look
down the road as far as possible (no blind guessing though) and identify possibilities. If these
possibilities then become more certain, you will have already identified them and can move
them to your shorter-term competitive planning document.

You might also like