Time
1 hour 43 minutes
Difficulty
Intermediate
CEU/CPE
2

Video Transcription

00:00
Hi, everyone, and welcome back.
00:02
Let's get started on Module two's first topic about network monitoring systems or in a mess.
00:10
Animus is an application tool used for monetary and managing network infrastructure and system operations. It includes integrated features such as alerts, reports,
00:21
the logs,
00:22
tickets
00:23
and that working maps, which we will discuss further
00:29
examples of enemies. Tools include solo wins, their work performance monitor,
00:34
Paisley's Pierre Teaching that work monitor and I Be Switched. What's up? Gold Network Monitoring. So far,
00:43
A and M s Alert said some notification triggers to send emails or SMS when the change occurs.
00:50
For example, setting an alarm or alert whereby the throws hold is less than 10 kilobytes per second for 10 minutes,
00:58
then you can go to fire in their work team.
01:00
Or you could also set an optional alert whereby if the condition has cleared or is no longer in the seat,
01:07
all Bolden underlined our parameters that can be changed according to how you want to set your alarm.
01:12
Instead of threats hold, you may choose other options such as state speed,
01:19
volume and change
01:23
as your enemies performs, his job to monitor
01:26
and an abnormality occurs
01:30
it will start prompting alerts to number operations team, which keeps you proactive as possible. When an event occurs,
01:41
An Animus report creates manual or automated time based reports to track and document network services and conditions. Here are some examples off reports from that rock flow
01:53
and performance monitoring
01:57
logs have a time stamp of events which are helpful when tracking changes or abnormalities in the network.
02:05
And remember, it is important that all devices in your infrastructure has the correct time configured,
02:10
whether it be manually configured or synchronized, you sing network time Protocol, or NTP.
02:19
As you can see in this column, error alert and debug shows the different severity levels off logs. We will get into this more later in the course.
02:32
Many in the mess have integrated support ticketing systems. Creating tickets can also be known as opening cases,
02:39
and this helps never operations Team. To track customer requests, assign a member or team for escalation of required
02:49
and wanted to response and resolution time for customer service performance,
02:55
a ticket this created either by a user reporting and incidents
03:00
or an alert prompted by your animus.
03:04
A reference or case number is created and handled by a member of the NFC or service test
03:10
to respond to the alerted or reported incident.
03:15
Based on the gathered information, the NTC member will identify whether it can be resolved within their own expertise
03:23
or whether it will be required to escalate toe a higher tier member
03:29
or more specialized team.
03:31
Interaction between the end user and NFC member is continuous and crucial.
03:39
Network mapping creates a graphical representation of your network infrastructure. It shows all the devices on your network. Helping network I'm in the street is to visualize your network.
03:52
It also contributes to identifying network faults, usually through the use of color coding. For example, green being active and red being down.
04:00
And, of course, pictures speak 1000 words.
04:08
All right
04:09
Quiz time, which enemas feature will be the priority to configure for improved reliability, off services and productivity. When a change occurs,
04:19
you have three seconds to the side,
04:23
and if you need more time, just feel free to pause the video
04:31
alerts. Depending on the individual or organisation, it may be decided to use all features in their enemies package.
04:39
However, in terms of priority,
04:42
it is safe to say that setting up alerts
04:44
definitely helps the network operations team to be notified when the change is detected on the network and immediately start investigating on the root cause.
04:57
And we're done with the animus topic.
05:00
So so far, we've discussed what isn't an M s. How is it useful in their work operations? And we discussed as well the animus features commonly seen, which are alerts,
05:11
reports, logs,
05:13
tickets and network mapping.
05:15
In the next video, we will look into S and M P.

Up Next

Network Operational Management

This course is designed to help network specialists understand the responsibilities and best practices involved with monitoring and managing network operations.

Instructed By

Instructor Profile Image
Sheane Jayne
Network Engineer
Instructor