West 9e Chapter 11 Slides
West 9e Chapter 11 Slides
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
After reading this chapter you should be able to:
• Explain how project management, application lifecycle management,
and change management help with planning for changes on a
network
• Identify methods to analyze a proposed design or change
• Describe tools and methods used to monitor and manage a network
• Describe tools and methods used to deploy and manage cloud
resources
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Introduction
• Properly designing a computer network is a difficult task
– Computer networks continue to increase in complexity
– It is difficult for an individual or a business to properly define the future of
computing within a company
– Computer network technology changes at a breakneck speed
– It requires planning and analysis, feasibility studies, capacity planning,
and baseline creation skills, among others
• Performing network management is difficult too
– Network managers must possess computer, people, management, and
financial skills while keeping up with changing technology
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Planning for Changes
• All companies have several goals such as increasing the
customer base, keeping services as effective as possible,
increasing the profit levels, and efficiently/effectively conducting
business
– From such goals, systems planners and management personnel
within a company try to plan changes to be implemented in order to
move the organization forward
• The planning for change reflects on concerns about:
– Project management
– Application lifecycle management
– Change management
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Project Management (1 of 2)
• To deal with a problem, including a computer networks one, it is
necessary to analyze possible solutions, select the best one, and
implement and maintain it according to a well-defined plan
• Project management is the application of specific skills, tools, and
techniques to manage processes in such a way that the desired
outcome is achieved
– Communication
– Negotiation
– Task and time management
– Cost and quality management
– Risk management
– Leadership
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Project Management (2 of 2)
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
ALM - Application Lifecycle Management (1 of 4)
• ALM is a specific use of project management
– The application lifecycle follows the progression of an application
from its conception through its retirement
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
ALM - Application Lifecycle Management (2 of 4)
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
ALM - Application Lifecycle Management (3 of 4)
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Change Management (2 of 4)
• Generally, the larger an organization, the more documentation is
necessary when making network changes
• While simple security patches sometimes are made without an official
change request process, more relevant changes are usually dealt with
in five steps:
– Submit a change request document
– Understand and follow the approval process
– Follow project management procedures
– Provide additional documentation
– Close the change
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Change Management (3 of 4)
Table 11-1 Parts of a change request document
Information Example
Person submitting the change request and The network administrator is submitting the request, and the director of IT must
person who must authorize the change approve it.
Type of change Software patch
Configuration procedures An upgraded application might require new data file templates be built, settings
defined for an entire department of users, or existing data be converted to a
new format.
Potential impact Ten users in the Accounting Department will need three hours of training.
Grounds for rollback The new application doesn’t work as expected, and the Accounting Department
head decides it’s best to go back to the old way of doing things.
Notification process Managements and users will be informed of the change through email.
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Change Management (4 of 4)
Table 11-2 Documentation edits
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Analyzing Design
• When considering changes to make to a network or its various resources,
you’ll need to consider both current and future requirements
• Some important tools to do so are:
– Network Modeling
▪ To identify connected systems at the WAN, MAN, and LAN levels
– Gap Analysis
▪ To identify the differences (the gap) between current and desired states
– Feasibility Studies
▪ To determine the practicality of proposed changes identified in the gap analysis
– Capacity Planning
▪ To try to determine the amount of network bandwidth necessary
– Testing Environments
▪ To keep separate testings from the production environment
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Modeling (1 of 5)
• Network models can either:
– Demonstrate current state of network
– Model desired computer network
• Series of connectivity maps are network modeling tools that depict
various locations involved over wide and local areas and
interconnections between those locations
– To create a wide area connectivity map, the modeler begins by
identifying each site or location in which the company has an office
– A metropolitan area connectivity map outlines the connection among
company’s offices
– A local area overview connectivity map describes logical and physical
groups as a single node and the links among those nodes by factors as
throughput, bandwidth, distance, or security
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Modeling (2 of 5)
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Modeling (3 of 5)
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Modeling (4 of 5)
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Modeling (5 of 5)
• If more detail is desired, the analyst can create a local area detailed
connectivity map
– A detailed map can show how individual workstations or groups of
workstations are clustered with switches, routers, and server farms
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Gap Analysis
• A gap analysis is a study used to
compare current conditions with
desired conditions and identifying how
to close that gap
• Both current and desired conditions
are expressed by factors as:
– number of customers, sales
revenue, or rate of growth
– IT costs, number of trouble tickets,
user satisfaction rates, or data
throughput
• Those factors might be referred as
KPIs (key performance indicators)
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Feasibility Studies
• As results from the gap analysis generate proposed changes, the team
needs a way to determine which suggestions for change are reasonable
• There are several ways to determine if a proposed system is going to be
feasible
– Technically feasible - proposed system can be created and implemented using
currently existing technology
– Financially feasible - proposed system can be built given the company’s
current financial ability
– Operationally feasible - system operates as designed and implemented
– Timely feasible - system can be installed in a timely fashion that meets
organizational needs
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Capacity Planning (1 of 2)
• Involves trying to determine the amount of network bandwidth
necessary to support an application or a set of applications
• Several techniques exist for performing capacity planning, including:
– linear projection
– computer simulation
– benchmarking
– analytical modeling
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Capacity Planning (2 of 2)
• Linear projection involves predicting one or more network capacities
based on the current network parameters and multiplying by some
constant
• A computer simulation involves modeling an existing system or
proposed system using a computer-based simulation tool
• Benchmarking involves generating system statistics under a
controlled environment and then comparing those statistics against
known measurements
• Analytical modeling involves the creation of mathematical equations
to calculate various network values
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Testing Environments (1 of 3)
• Planned changes should never be deployed directly in the active
production environment that is currently supporting users and work
processes without extensive testing first
• Typical environment types used through various phases of product
development include:
– Development - a controlled environment where an app can be
developed or changed (patches, improvements, etc.)
– Staging - a different team deploys the app in a staging environment for
QA (quality assurance) and testing
– Production - this is the live environment where users interact with the
active version of the app
– Duplicate production - a duplicate production environment, at least
temporarily, for an application or other services
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Testing Environments (2 of 3)
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Testing Environments (3 of 3)
• Various techniques offer the opportunity for QA testing before
deploying changes into production:
– Sandboxing: a sandbox is an isolated environment where you can
experiment without exposing sensitive resources to risk of damage
– Load testing: it places the full force of anticipated demand on a system to
determine if it can handle the load
– Regression testing: it confirms that changes to one system haven’t
negatively impacted other systems or functionality
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Monitoring and Management
• The network requires ongoing monitoring and maintenance to
ensure its continued performance and reliability including during the
time changes are been implemented
– Gaining access to the relevant information can be challenging, and
sorting through all that information can be equally difficult
▪ a network admin must seek an appropriate balance between gathering
all needed information and filtering information to just the important parts,
so staff aren’t inundated with irrelevant data
• To that end it is important to master:
– Network monitoring tools
– The creation of baselines
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Monitoring Tools (1 of 10)
• Monitoring and diagnostic tools:
– Monitoring Network Hardware
▪ Electrical testers measure AC and DC volts, resistance, and continuity
▪ Cable testers can verify connectivity and test for line faults, such as open
circuits, short circuits, reversed circuits, and crossed circuits
▪ Network testers have a display that graphically shows a network
segment and all the devices attached to it, thus troubleshooting the
network and suggesting possible corrections
– Monitoring Network Traffic
▪ A network monitor is a tool that continually monitors network traffic
▪ A protocol analyzer can monitor traffic at a specific interface between a
server or client and the network
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Monitoring Tools (2 of 10)
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Monitoring Tools (3 of 10)
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Monitoring Tools (4 of 10)
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Monitoring Tools (5 of 10)
• Alert and logs
– Some traffic monitoring tools provide real-time analysis of data, while
other tools are designed to store data for retroactive analysis only as
needed. Each approach results in different outcomes:
▪ Alert message: monitoring live data allows
detection of faults and other defined
conditions, which can trigger alerts
▪ Log entry: virtually every condition
recognized by an operating system or
network monitor can be recorded in a log
– Syslog is a standard for generating,
storing, and processing messages about
events on many networked systems
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Monitoring Tools (6 of 10)
• Simple Network Management Protocol (SNMP)
– Organizations often use enterprise-wide network management systems
to perform real-time monitoring functions across an entire network
▪ It maps each network device that is managed by an agent (management
software)
▪ Agents communicate information about managed devices via any one of
several application-layer protocols (usually SNMP for modern networks)
▪ SNMP manager software controls the operations of a managed element
and maintains a database of information about all managed elements
▪ The MIB (Management Information Base) holds the information about all
managed devices
– SNMP can also perform an autodiscovery operation to discover new
elements that have been added to the network
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Monitoring Tools (7 of 10)
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Monitoring Tools (8 of 10)
• Simple Network Management Protocol (SNMP)
– Managed elements are monitored and controlled using three basic
SNMP commands:
▪ The read command is issued by a manager to retrieve information from the
agent in a managed element
▪ The write command is also issued by a manager, and it’s used to control
the agent in a managed element
▪ The trap command is used by a managed element to send reports to the
manager
– The second version, SNMPv2, is still widely used
▪ The third version, SNMPv3, requires more complex configurations, thus
avoided by many admins
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Monitoring Tools (9 of 10)
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Monitoring Tools (10 of 10)
• NetFlow
– SNMP provides real-time monitoring of network activities and device
states with an emphasis on device health, performance, and
configuration
– To provide a comprehensive view of network traffic across all devices
another protocol is employed: NetFlow
– NetFlow is a proprietary traffic monitoring protocol from Cisco that tracks
all IP traffic crossing any interface where NetFlow is enabled
– When NetFlow is enabled on a network device, each unique
conversation is collected in a NetFlow cache as a flow record
– A challenge with NetFlow is determining the optimal balance between
tracking all traffic and enough traffic to grasp the network behavior
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Creating a Baseline (1 of 3)
• Involves measurement and recording of a network’s state of operation
over given period of time
– It can be used to determine current network performance and to help
determine future network needs
– Baseline studies should be ongoing projects, and not something started
and stopped every so many years
▪ Collect information on number and type of system nodes, including
workstations, routers, bridges, switches, hubs, and servers
▪ Create an up-to-date roadmap of all nodes along with model numbers, serial
numbers, and any address information such as IP or Ethernet addresses
▪ Collect information on operational protocols used throughout the system
▪ List all network applications, including the number, type, and utilization level
▪ Create a fairly extensive list of statistics to help meet your goals
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Creating a Baseline (2 of 3)
• The list of statistics includes:
– Average network utilization (%)
– Peak network utilization (%)
– Average frame size
– Peak frame size
– Average frames per second
– Peak frames per second
– Total network collisions
– Network collisions per second
– Total runts
– Total jabbers
– Total CRC errors
– Node(s) with the highest utilization and corresponding amount of traffic
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Creating a Baseline (3 of 3)
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Cloud Deployment and Management
• Many times, changes to a company’s network infrastructure includes
a shift to the cloud
• Unlike with an on-prem network, a public cloud customer does not
have access to the underlying hardware hosting cloud resources,
and most of the time, traffic between these resources cannot be
directly observed
• In this context it is important to pay attention to:
– Cloud migration issues
– Cloud provisioning and configuration management
– Cloud monitoring and optimization
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Cloud Migration (1 of 5)
• For most companies, their initial migration to the cloud is
performed in layers, beginning with a simple application and
continuing with more complex projects
• The migration phases are a circular process as the process of
cloud migration is never fully complete or static
– Probably the most challenging
phase of a migration to the cloud is
the planning stage
▪ a well-laid plan will help to ensure
the migration proceeds smoothly
and the outcome meets the
organization’s goals
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Cloud Migration (2 of 5)
• An effective cloud migration plan contains thorough information on:
– Business continuity: consider the effects of any anticipated downtime
and how to minimize or avoid it, plus the user training
– Legal restrictions: countries and states have different laws for data
protection, thus not all data cannot be stored at all data centers
– Baselines: collect extensive baselines before beginning any transition to
indicate current functioning and configuration of the network’s systems
(cont.)
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Cloud Migration (3 of 5)
• An effective cloud migration plan contains thorough information on
(cont.):
– Existing systems: thoroughly understand and document existing systems
that will be affected by the cloud migration
– Target hosts: Configure this target host carefully to match the needs and
anticipated growth of the transitioned resources
– Cloud architecture: A cloud deployment is made up of VMs, applications,
databases, servers, processes, virtual appliances, logs, and storage
blocks
– Order of operations: Consider in what order elements should be moved
to the cloud
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Cloud Migration (4 of 5)
• Migration strategies include:
– Rehost: also called lift and shift or forklift, this migration strategy refers
to moving the application or data into the cloud as it is
– Revise or replatform: also called lift tinker and shift, this approach makes
some relatively minor changes to the application or data before moving it
– Refactor, rearchitect, or rebuild: in this approach, the changes are more
significant, such as rewriting huge portions of an application’s code
– Repurchase: also called rip and replace, this strategy refers to replacing
the product with an existing or custom-designed cloud-native product
– Retain: also called the do-nothing option, this means the organization
keeps using an application or data as it is
– Retire: this basically means the organization stops using the application
or data
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Cloud Migration (5 of 5)
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Cloud Provisioning and Configuration
Management (1 of 5)
• When companies deploy extensive cloud infrastructure, especially in a
production environment, they use automated processes that can be
tracked, audited, and consistently repeated
– Automation refers to the use of software-based solutions to perform a
process or procedure with minimal human intervention
▪ Faster deployment, adjustments, and corrections
▪ Better control
▪ Lower costs
▪ More secure
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Cloud Provisioning and Configuration
Management (2 of 5)
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Cloud Provisioning and Configuration
Management (3 of 5)
• Some of the maintenance and security tasks that can be performed by
these automated tools include:
– Create backups
– Clone, resize, or remove resources
– Apply patches, updates, and upgrades
– Restart or shut down VM instances
– Enable or disable alerts
– Detect signs of an attack
– Quarantine compromised resources
– Manage security rules
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Cloud Provisioning and Configuration
Management (4 of 5)
• How can you set up a cloud system to make good decisions reliably and
perform complex tasks without human intervention?
– A runbook is a collection of physical or digital documents that outline the
precise steps to complete procedures or operations in a specific IT
environment
– This application of the runbook concept in an automated environment is
called IaC (infrastructure as code), where the steps needed to configure
or change a cloud environment are written in code and are deployed all at
once rather than requiring a human admin to complete one step of the
deployment at a time
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Cloud Provisioning and Configuration
Management (5 of 5)
• Automation and orchestration tools might be built into the cloud platform
or provided by third-party vendor applications that interact with the cloud
platform through API (application programming interface) messages
– Provisioning tools deploy new cloud resources. Many kinds of automated
processes can be part of IaC provisioning such as auto-scaling, which is a
type of provisioning task
– CM (configuration management) tools configure existing resources to
match a particular configuration template
• Each major cloud platform includes its own automation tool, such as
AWS’s CloudFormation, Azure’s Resource Manager, and GCP’s
Deployment Manager.
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Cloud Monitoring and Optimization (1 of 3)
• Many variables contribute to the fluctuation of cloud performance
• Traditional network monitoring tools often rely on having access to
physical network hardware or having deep access to all network traffic,
but both of these are restricted in the cloud
– Cloud services generate API messages that report on various metrics for
those resources
– Monitoring tools capture information from those APIs and organize the data
to report on the health, activities, and expenses of the monitored resources
– Data collected on these metrics can be monitored on the service’s own
page
– Dashboards provide a passive viewpoint for cloud admins to monitor cloud
resources
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Cloud Monitoring and Optimization (2 of 3)
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Cloud Monitoring and Optimization (3 of 3)
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Summary (1 of 4)
• Project management is the application of specific skills, tools, and
techniques to manage processes in such a way that the desired
outcome is achieved
• A specific use of project management is in ALM (application lifecycle
management)
• The streamlining and built-in repetition of the ALM has come to be
known as DevOps (development and operations)
• Change management consists of carefully defined processes to
evaluate the need for changes, their cost, a minimal disruption plan,
and a backup plan if the changes don’t work out as planned
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Summary (2 of 4)
• One technique used to model a corporation’s network environment is
to create connectivity maps for WANs, MANs, and LANs
• A gap analysis is a study used to compare current conditions with
desired conditions and identifying how to close that gap
• A feasibility study will consider all relevant factors to determine the
practicality of proposed changes identified in the gap analysis
• Capacity planning involves trying to determine the amount of network
bandwidth necessary to support one or a set of applications
• Typical network environments for application development include the
development, the staging, the production, and the duplicate
production ones
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Summary (3 of 4)
• Common hardware testing devices can be electrical, cable, and network
• Alarms and logs provide, respectively, real-time and time deferred
monitoring options
• Syslog is a standard for generating, storing, and processing messages
about events on many networked systems
• SNMP (Simple Network Management Protocol) allows management and
real-time network monitoring, and NetFlow is a proprietary traffic
monitoring protocol from Cisco with a similar purpose
• To identify changes in network performance, the network administrator
must first establish a baseline, then comparing with new results network
weaknesses and strengths can be identified
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Summary (4 of 4)
• Cloud migration consists of five major phases: assess, plan, migrate,
validate, and manage
• Automation refers to the use of software-based solutions to perform a
process or procedure with minimal human intervention
• The application of the runbook concept in an automated environment is
called IaC (infrastructure as code)
• Automation and orchestration tools might be built into the cloud platform
or provided by third-party vendor applications that interact with the cloud
platform through API messages
• Provisioning tools deploy new cloud resources, while CM (configuration
management) tools configure existing resources from templates
Jill West | Curt M. White, Data Communications and Computer Networks: A Business User’s Approach, 9th Edition. © 2023 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.