Assignmnet-4 comp-390 jasmine COMP cascsa PDF

Title Assignmnet-4 comp-390 jasmine COMP cascsa
Author Tushar Gupta
Course Computer science
Institution University of the Fraser Valley
Pages 6
File Size 130.7 KB
File Type PDF
Total Downloads 36
Total Views 194

Summary

All assignments for summer 2021 . Comp 340 COmp 390 and all other of university of the fraser valley...


Description

1. What is the role of SDN in network deployment and maintenance? SDN (software-defined networking) is a networking architecture that abstracts the distinct, identifiable levels of a network to make it more agile and adaptable. SDN aims to enhance network control by allowing businesses and service providers to react rapidly to changing business needs. A network engineer or administrator may shape traffic in a software-defined network from a centralised control panel without having to touch individual switches in the network. Regardless of the particular connections between a server and devices, a centralised SDN controller will instruct the switches to offer network services wherever they're needed. This method differs from traditional network design, in which individual network devices make traffic decisions depending on the routing tables they have set. For almost a decade, SDN has played a role in networking, and its growth and functions have continued to evolve. “ SDN is important because it gives network operators new way to design, built, and operate their network.” It's frequently used in conjunction with network function virtualization (NFV), which virtualizes network functions to isolate them from hardware (VNFs). Within a network, SDN allows cloud-like computing. Through a centralised management console that is separated from the network's actual hardware, network engineers and administrators may adapt rapidly to changes in business needs. In other words, SDN establishes a network's centralised brain, which can interact with and command the rest of the network. Virtual overlay networks, or software-defined networks that lie on top of physical hardware infrastructure, are created using SDN.

2. Explain in details different tools used for monitoring a network? Network performance must be measured and monitored for two essential reasons. The first is to give the tools needed to assess network performance through the lens of Grid applications and, as a result, detect any potential strategic concerns. The second is to supply the measurements that Grid resource broker services demand. The criteria for network monitoring are outlined in this paper. The traditional network monitoring metrics are then explained, and existing network monitoring methodologies and tools are catalogued. The monitoring system's architectural design is given. It consists of four functional units: monitoring tools, a store for gathered data, analysis tools for generating network measurements, and access and use tools for the produced metrics. It explains the tools used for this prototype version and how they give metric data to the Grid middleware as well as a human observer through visualisation. Network metrics that characterise a network are calculated using network monitoring tools. These will be utilised by Grid middleware to maximise the performance of Grid applications; they will also be used by network researchers and developers, as well as network support workers, to maintain and operate the grid's network. The Grid apps will first and primarily employ network monitoring to optimise their utilisation of the networks that make up the Grid. The publishing of metrics that characterise the network's present and future behaviour to the Grid middleware, so that Grid applications may modify their behaviour to make the greatest use of this resource, will be of fundamental importance. Second, it will be used to give background network performance metrics that will be useful to network administrators and others in charge of providing network services to Grid apps.

3. Explain the process of deploying Syslog in an enterprise network. Also explain the Syslog message format along with the different severity levels. Process of deploying Syslog in an enterprise network: Deploying a campus network of an organization of routers, firewall, VPN concentrators, and switches to interconnect the application servers to the user workstations. The data admin has built a syslog server to provide a centralised place to gather all messages and alarms issued by various Cisco devices. This server should be set up to receive, filter, and store syslog messages from Cisco devices. Deploying: Many data admin may opt to utilise the default syslog daemon supplied with the Linux operating system to gather syslog messages generated by Cisco devices. The internal syslog server is not enabled for usage as a network-based syslog server, despite being fully integrated with the operating system. You must setup the syslog daemon as a network-based syslog server using the /etc/ syslog.conf file. Additionally, the syslog daemon must be configured to accept syslog messages from the network. The file controls the configuration of the syslog daemons which contains sorting syslog message rules. The syntax for specifying a rule:

Facility.serveritydestination-file-path Severity levels: Number 0

Severity level Emergency

1

Alert

Explanation It is a panic condition, which would be affecting multiple apps, servers or sites. Should be corrected

2

Critical

3

Error

4

Warning

5

Notice

6

Information

7

Debug

immediately- notify staff who will be able to solve it. Should be rectified as fast as possible, but indicates failure in the primary system, fix critical issues before alert. Non urgent failure- there should be relayed to developers or admins Warning messages-not an error, but indication that an error will occur if action is not taken. Events that are unusual but not error condition.might be summarized in an email to developers or admins to spot potential problem. Normal operational message- may be harvested for reporting, measuring throughput, etc. Information useful to developers for debugging app, not useful during operations.

4. What is the role of NetFlow in an enterprise network? Explain the process of implementing NetFlow in an enterprise network. Cisco created NetFlow as a network protocol for collecting and analysing network traffic flow data generated by NetFlow-enabled routers and switches. IT workers use NetFlow to evaluate network traffic flow and volume in order to identify where traffic comes from, where it goes, and how much traffic is created. NetFlowenabled routers send traffic information to a NetFlow collector in the form of NetFlow records. The collector, which can be either a hardware device or software, does the actual traffic analysis and presentation to the user.

Refereneces: https://www.applicationperformancemanagement.org/network-monitoring/network-monitoringtools/ https://www.sdxcentral.com/networking/sdn/definitions/what-the-definition-of-software-definednetworking-sdn/ https://www.sdxcentral.com/networking/sdn/definitions/why-sdn-important/ https://searchnetworking.techtarget.com/definition/software-defined-networking-SDN https://www.ciscopress.com/articles/article.asp?p=426638&seqNum=2 https://success.trendmicro.com/solution/TP000086250-What-are-Syslog-Facilities-and-Levels...


Similar Free PDFs