Saturday, February 13, 2010

SYSTEM ADMINISTRATORS' EXPERT EFFORT FOR EFFICIENT NETWORK OPTIMIZED PERFORMANCE RELIABILITY AND FUNCTIONALITY

trusciencetrutechnology@blogspot.com Vol.2009, No.11, Dated: 19th November 2009

K. Sai Rangadhama Rao
ICFAI Business School, Dontannapalli village, Sankarpally Mandal, RR District, Hyderabad
Permanent address: 17-11-10 Narasimha Ashram, Official Colony, Maharanipeta. P. O, Visakhapatnam-530002:
Mobile: 9912345252 Email Id: rangadhamas@gmail.com

PREAMBLE:
I am delighted to present this article on the BlogSpot post for the benefit of youngsters at ICFAI foundation for higher education. I am presently an employee of a deemed to be university enterprise in Hyderabad. Earlier I have successfully worked at Visakhapatnam in Computer Maintenance Corporation Institute on network efficient maintenance for the benefit of software development participants and candidates of the Institute.

Administration packages or network management tools need to be understood thoroughly since networks today have become inherently complex and for it many factors have contributed. The nature of our job surpasses over an enterprising CEO.
At ICFAI Business School I deliberate on the following:
I Compatibility capacity of 16MB lease line
II. Administration streamlining of Hewlett Packard server ML350G4
III. Administration smoothness by CISCO Firewall
AIM

The objective of this article is to high light certain fruitful ideas for the optimal performance, reliability and functionality of our server total availability to meet the entire demands of our small and medium enterprisers’ school of business management.
LEASEDLINE:
A dedicated data line of 16MB microwave link of reliance communications for the University campus consisting of Academics (Faculties of Information Technology & operations, Marketing, Finance, Economics, PhD and research sectors), Administration, Accounts, Hostels, Placements Department and Clinic is under my supervision and guidance of network performance and reliability. The design of computer networks is essentially based on the selection of a subset of links such that fault tolerance and reliability are safe guarded. I am alert on distribution of the 16 MB line through proxies to various student and other departments.
The proxies are used to implement security setup. At our Institute, with proper policy decisions, we have implemented the access right to the clients. Firewall is one of the mechanisms widely used and we have preferred the CISCO Firewall. We use advanced TCP/IP configuration settings to assign multiple IP addresses to the network adapter card connected to the INTERNET.
TCP/IP is a router protocol, i.e. each packet routed has a specific address. Dedicated routers connect two networks and route packets between them. Routers are configured to allow only certain packets.
Two main categories of proxies are in use by our organization. One of which caters to the need of students and the other furnishes the requisite bandwidth to the Institute staff at all levels. The nature of the problems by the staff are either due to login failure or unable to accesses the campus network, which is in fact the intranet, or have switching on problems of the computer systems. Then they would report to us about this difficulty they are facing by intercom telephone.
I assert that if one proxy fails the network fails the party concerned cannot access the internet and intranet and these facilities immediately stop. I get the feedback either from the end user regarding the hardware failure or by the campus network then it would be easy for me to assess the nature of the problem faced by the fretful user. Also downtime is to be avoided in this process. The problems that I notice are with power failures, due to hangover of the server and I am fast to respond instantly. To resolve such problems in case of hardware failures I am prompt judiciously to help the anxious party by approaching him personally and restore their efficient operation. The internet or the intranet problems to the end user may also be due to the fibre-optic rupture. In that case I would trace the problem, over the extent of the fibre-optic link, and intimate the company people to assist us.
Server HP ProliantML350G4
This particular server has fault tolerance and raid implementation. This server has also reliability and manageability features and particularly suited for small business enterprises. Our Institute has therefore chosen this server to help our student community to be aware of the implementation and maintenance of this kind of servers.
The role of server is to control the domains. We have a forest which has two domains mainly to provide the requisite Identity and Security. For students there are about 2000 login user Ids. For the staff we have about 500 user login Ids. The domain problem or the problems of login of any party is invoked only when the fretted party informs us. Then we would go through the login data of the previous occasions and asses the present situation.
The client server model of our network ensures that the server verifies the authenticity of a request from client and grants the service, with the server streamlining the resources, especially when we have multiple requests for a particular resource. The paradigm of the centralized control has all the features of a powerful machine with high memory. Virtual directories are restricted to one virtual server by addressing an IP address to them.
OPTIMIZED PERFORMANCE AND RELIABILITY:
Documenting our network resources, configurations and logon scripts has been found by me to help the performance of the server. Reliability of the network depends on the planning network design and architecture. Thus we have implemented the best suitable computer network for responsible centralized network administration. We have also implemented the browser-based accesses to in depth instrumentation that allows sending alerts to environmental failures. The fault tolerance of our network has been achieved by optimizing our centralized network reliability. Network switches are chosen to be CISCO kits and though costly have provided us error-free operations and to date have been found to be good. A CISCO route firewall setup has found to provide comprehensive coverage and data protection.

FLATTENED ORGANIZATIONAL HIERARCHY:
This has been found profoundly useful at our Institute for furtherance of closer communication between departments since there only fewer levels that need to be effectively coordinated. So we have much less overhead expenses and achieved considerably more rapid ability in communication.
A key part of our ERP has been to identify the expert critical resource persons to yield higher profits and achieve the desired results.
Six sigma qualities in all processes guaranteed us that failures in quality cannot happen. This helped to quantify the reliability of our processes. So our organization has only defective service in less than 3.4 defects per million.
INTEGRATION:
We have integrated entire Intranet to the Internet, rather than connecting a subnet. So we have many security concerns and implications. Tighter integration is possible with priority for I-frames and significant program identifiers. Data switches are employed to switch spare lines or equipment to switch test equipment on line, to select clients, or to configure the data paths in our network administration. Our network, fault diagnoses and repairs the data line monitors. An A/B switch that substitutes a spare modem, would switch a single line (4-wire analog to 25-wire RS-232) between one or two other lines or devices.

DNA
Network software running on Top of hardware also needs addresses to keep things straight and neat. Any new device attached to the network and turned on it is necessary to reconfigure network possibly by adding a router. Passive network has advantages of being less expensive than an Active NT but requires intranet traffic. At our Institute with the ONU (optical network unit) we have a to and return traffic in the intranet. ONU is responsible for most processing in FTTC systems for ATM layer multiplexing MAC protocol enforcement and electrical to optical media conversion. In the physical layer ONU converts optical signals to electrical signals. FTTC fibre to the curb (paved way) optimizes efficiency, reliability and functionality with rise of the bar on the speed and reliability to and from client for point-to-point wired networks.
ADDITIONAL DOMAIN CONTROLLERS:
Primary domain controller has additional domain controllers for supporting the services like DHCP and DNS so that the clients will be able to use the network for their purposes. We have 2000 laptops and client computers about 750 all of them need to have IP addressing for which we have one main DHCP and another one for fault tolerance. We have implemented VLANs for tighter control of security to grow the network.

When a dynamic configuration protocol and windows internet name service (WINS) are enabled on the network, then clients are entitled to use the server. This is the adopted practice in our Intranet sites. Using DCHP in the intranet needs DHCP server software.
Configuring the forward look-up and the reverse look up Zones helps the DNS server optimally for name resolution in the network.
DNS is a distributed data base that contains mappings between host server names and IP addresses and provides hierarchical structure for identifying the clients. Each host or the node on the DNS is known as a Domain. This DNS tree structure is similar, to the file system, of course consists of domains and sub domains. The host system has indeed a fully quantified domain name (FQDN).
CISCO FIREWALL:
This is basically a hardware based for protection from threats coming from other networks. Our CISCO router is NAT-enabled naturally, to transfer the generated private packet to public network or vice verse, which provides important barrier against the threats from other networks.

NIU:


NIU is the home device that encodes and decodes bits to and from the access network.


NAME RESOLUTION SYSTEM:


NRS helps clients to use friendly names with Internet Explorer when browsing. The advantage of automatic IP addresses administration with DCHP server and WINS server method helped us for the reduction of IP broadcast traffic in Internet works. WINS is more flexible than DNS, allowing client Laptops to easily locate remote systems across LAN and WAN.
Networks have two challenges, classified in to two categories as, technical challenges and Cultural confronts. To support the growing client relationship management (CRM) network infrastructure needs to be continuously tuned to deliver total availability. We have identified CIC (client interaction centre) i.e. central location as the most critical component of the CRM.



SUMMARY:


As a system administrator I have given several ideas mainly to understand the achievement of optimized network performance and reliability for small and medium business enterprisers. The article would be useful for business management consultants and Information Technology practitioners. The cost-wise details I have avoided since it falls in the domain of economics of a network setup. I have concentrated only on the technical aspects of system administration particularly implemented and being efficiently pursued for the benefit of my Institution, faculty and the student community. I have interest and would be providing the algorithms for optimizing the terminal reliability in future.

ACKNOWLEDGEMENT:


I am grateful to my authorities and to my colleagues of the ICFAI Business School and particularly to the Director Prof. D. S. Rao, with whose encouragement and guidance am able to pursue my system administration enterprise for the benefit of my Institution.
*****

2 comments:

TRU_SCIENCE & TRU_TECHNOLOGY said...

Re: Inviting you to peer review the article

Hello Sir

This article is simply superb. I believe Few more additions to be done to this Article.

Domain Controllors

Basic Points :-
1) In Desinging Domain Controllors make sure that there should be a separate DC for each site
2) Please use a separate server to implement other services like DHCP, DNS and WINS. Don't merge these services with the DC.

If we can add some thing about Active Directory then it might be effective in Security field.

Thank you
Best Regards
Vijay
24 Nov 2009 21:39

TRU_SCIENCE & TRU_TECHNOLOGY said...

EDITORS NOTE
K Sai Rangadhama Rao the author of the article asserts that the comments by Vijaya Saradhi have been already incorporated in the original article perhaps though not explicit they have been dealt with implicitly.
He shall make another article to add the other suggestions made by the peer reviewer Vijaya Saradhi whom thanks profusively.