Best IT Documents.com Blog


Sample Word – Ebola Corporate Pandemic Virus Emergency Response Plan

Posted in Compliances (1300),Policies - Standards (600),Security (1500) by Guest on the September 30th, 2014

Well if your corporation did not have a plan before they sure need one now.

Ebola Corporate Pandemic Virus Emergency Response Plan

http://bestitdocuments.com/Services.html

 

Comments Off on Sample Word – Ebola Corporate Pandemic Virus Emergency Response Plan

Sample Visio – HIPAA – Understanding Clinical Workers considerations

Posted in Compliances (1300),Visio Samples - Stencils (457) by Guest on the September 26th, 2014
Comments Off on Sample Visio – HIPAA – Understanding Clinical Workers considerations

Sample Word – Applications Life Cycle Management Questionnaire

Posted in Compliances (1300),Policies - Standards (600),Web Services (250) by Guest on the September 25th, 2014
Comments Off on Sample Word – Applications Life Cycle Management Questionnaire

Assuring Business Availability

Posted in Compliances (1300),Data Center - SOC - NOC by Guest on the September 20th, 2014
  • Manage
  • Thresholds
  • Events
  • Configuration

Assets

  • Monitor
  • Databases
  • Backup
  • File Systems
  • Files
  • Logical Volumes
  • Physical Disks
  • Interconnects

Control

  • Automation
  • Notification
  • Escalation
  • Correlation

 Optimize

  • I/O
  • Capacity use
  • Application service

Predict

  • Forecast, Model, Simulate

Benefits

  • Increases control of enterprise environment
  • This means more availability for your infrastructure, ie more customer and end-user satisfaction, ie not lost business due to poor performance
  • Saves time in identifying the cause of complex problems : for example, if a network is down because of a device failure is easy. However, trying to understand why performance is poor is much more difficult. Especially if we try to corelate users, applications, systems and network information together.
  • Helps eliminate IT slowdowns, maximizing service performance and availability minimizes slowdown thus increasing the end-user and customer satisfaction
  • Allows efficient capacity planning of network resources

http://www.bestitdocuments.com/Services.html

 

Comments Off on Assuring Business Availability

Visio Sample – Active Directory IO Steps

Posted in O S (375),Visio Samples - Stencils (457) by Guest on the September 18th, 2014
Comments Off on Visio Sample – Active Directory IO Steps

Our Cisco Switching Notes

Posted in Networking (340),Security (1500) by Guest on the September 12th, 2014
  • Switching is ASIC (hardware) –based, as opposed to bridges (software).
    • Otherwise, a switch is like a bridge with many more ports.
  • A L3 “intelligent” switch is faster than a router and can sort by L3 addresses.
  • Switches perform address learning by reading frames’ source addresses.
  • They make forward-or-filter decisions whereby broadcasts (all 1s), multicasts (host address = all 1s), and frames for unknown destinations go out all ports.
  • This breaks up collision domains by sending only needed frames out each port.
  • BUT it does not break up broadcast domains because broadcasts go out all ports.
  • Switches practice loop avoidance to stop broadcast storms, duplicate frames, and confusion in their filter tables caused by multiple paths.
  • The key method for loop avoidance is Spanning Tree Protocol (STP) using Bridge Protocol Data Unit (BPDU) multicasts exchanged every 2 seconds.
  • STP (IEEE 802.1d) is a messy protocol that causes lots of delays and recalculates the entire tree every time the network configuration changes.
  • STP elects a root bridge based on its 8-Byte bridge ID (derived from its device priority and its MAC ID).  Priorities are compared (32,768 is the default) and the lowest value wins.  If tied, the lowest MAC address wins.
  • Root bridge decides ports settings on remaining devices:  open (designated) or blocked (non-designated).  Lowest cost ports leading back to the root bridge are called “root ports” and become the path for communications with the root.
  • Designated ports are chosen by lowest cost path, using links’ accumulated BWs.
  • When network topology changes, all data stops for 50 seconds (“convergence time”) while STP re-configures all ports.  Port transitions go as follows:
    • Blocking
    • Listening (exchanging BPDUs and checking for loops) – “forwarding delay”
    • Learning all MAC addresses – a period also called a “forwarding delay”
    • Forwarding 

Three Frame Handling Modes

  • Cut-through:  fastest possible; only destination header is checked (1st 13 Bytes)
  • Fragment Free:  (default mode for Catalyst 1900 switches) reads 1st 64B checking for collision damage before forwarding
  • Store-and-forward:  entire frame checked; rejected if too short (<64B) or long (>1518B) or if it has a CRC failure; method with greatest “latency” (delay).

http://www.bestitdocuments.com/Networking.html

 

Comments Off on Our Cisco Switching Notes
Next Page »