Preview

Importance of Network Documentation

Powerful Essays
Open Document
Open Document
1165 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Importance of Network Documentation
Importance of Network Documentation

Undocumented networks are extremely common. Many times this is related more to the difficulty of keeping the documentation up to date rather than to the difficulty of the documentation process itself. Many LAN Administrators had big dreams at one time of keeping elaborate drawings detailing every last aspect of the network. However, networks tend to change too frequently for such drawings to stay current. In spite of the difficulty, having a well documented network can help you solve problems quickly when they arise and is vital to the overall security of your network. In this article, we’ll discuss some alternative documentation methods that are more practical in the ever changing world of networks.
Label Everything
Perhaps the most important part of a good network documentation plan is to label everything. You should create the labeling scheme with the idea that the structure of the network will be constantly changing as will the people who use the network.

Perhaps the most important thing to label is your network cables. If you’ve been networking for very long, you’ve probably seen way too many network closets that contain a massive web of tangled cable. Usually all of this cable looks alike, and it’s impossible to tell which cable connects to what without some extensive diagnostic work. Most of the network administrators that I know are way too busy to have time to fish through a million cables hoping to stumble upon the correct one every time that there’s a problem.

Because of this fact, you should label both ends of each cable as to what the cable does. This label should be written in such a way that in five years when you’ve moved on to another job or have totally forgotten all of the stuff that you did today that the labels will still make sense.

Although it may seem way too obvious, this means making the cable legible. Wrapping the cables in masking tape and writing on the tape is a bad idea. These sort of

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1310 Unit 6 Exercise 1

    • 419 Words
    • 2 Pages

    On a TWISTED PAIR CABLE I chose to install an RJ-45. This is the standard Ethernet connector for most systems used today. I would first measure out the length of cable that I would need. I would then use a wire cutter to cut the length that I need, leaving enough room for corrections and to open the wire. I would then use wire strippers to remove a small piece of the outer most jacket. I would then choose what connection I wanted to make (568A or 568B). I would then untwist the wires and put them in the correct color order that I need. Then I would flatten out the wires and in one hand hold my RJ-45 connector and then with the other hand feed the wires into the connector. This is usually pretty simple with the way the connectors are made, and they are also usually clear. After I’m sure that the wires are in the connector all the way, and in the right order, I would use a wire crimper to clamp the wires securely into the connector.…

    • 419 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1310 Unit 3 Exercise 1

    • 401 Words
    • 2 Pages

    A strong string inside an optical cable used to strip the cable by pulling it so you don’t have to use a bladed tool.…

    • 401 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4 Exercise 1

    • 1072 Words
    • 4 Pages

    Patch cords- Any flexible piece of cable that connects one network device to the main cable run or to a patch panel that in turn connects to the main cable run; also called. Used for interconnecting circuits on a patch panel or cross-connect. Patch cables are short distance, usually have connectors preinstalled on both ends, are used to connect equipment, and are generally between 3 and 6 meters long.…

    • 1072 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    UTP- summary (Short for unshielded twisted pair, a popular type of cable that consists of two…

    • 725 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Network Security Policy: Best Practices White Paper - Cisco. (2005, October 4). Retrieved from http://www.cisco.com/c/en/us/support/docs/availability/high-availability/13601-secpol.html…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Good Essays

    Configuration management documentation is important in any large organization or business, so understanding the types of documentation are important. I am going to go over the various types of documents and schematics you will have to be familiar with. I will try and explain the differences between a wiring schematic, physical network diagram, logical network diagram, policy, procedure, configuration, regulation, acceptable use policy, and the security policy.…

    • 518 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Netw 410 Week 1 Lab

    • 883 Words
    • 3 Pages

    I felt this was a good diagram; it is easy to follow and the icons used are well chosen and consistant (all desktop computers use the same icons and none are used for more than one type of device). Everything is labeled except for the solid vs dotted lines but those are obviously wired vs. wireless…

    • 883 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Weaknesses are a symptom that is prevalent in today’s information technology realm, indicating vulnerabilities and risks that come hand and hand with shared networks like Aircraft Solutions. With enterprises exchanging an unprecedented level of information over open networks, the vulnerabilities and possibility of compromised security by unwanted intruders is swelling up into a new type of beast.…

    • 1105 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    and identify the devices on the network and the operating systems and services running on them.…

    • 652 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It is an arrangement of the various elements of a communication network. There are different types of topology as Lowe (2012, p8) said “each type of networking topology (bus, star, expanding star, ring, mesh) offers advantages and disadvantages”.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Good Essays

    1. Identify the touch points between the objectives and requirements of PCI DSS and YieldMore’s IT environment.…

    • 619 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It510 Final Project

    • 1574 Words
    • 7 Pages

    There are several techniques used in the documentation process. As a system analyst I would propose to the members of this group a straightforward standardized approach. A reasonable suggestion for this project would be to use the Procedure Manual technique for documenting this system. The Procedure Manuals will provide instructions on how to operate and understand how the system works. These manuals are also used as a guide that can be updated at different intervals for future users. Procedure Manuals are also made available to users via the Web. This new approach has made it convenient for users to seek support in a much faster way by offering a FAQ page, and online chat (Kendall & Kendall, 2011). In addition it is also a great tool for future analyst.…

    • 1574 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Unit 8 Lab 1

    • 662 Words
    • 2 Pages

    References: Oliviero, A., & Woodward, B. (2011). Connectors. In A. Oliviero, & B. Woodward, Cabling: The Complete Guide to Copper and Fiber-Optic Networking (4 ed., pp. 679-683). Indianapolis, Indiana, United States of America: John Wiley & Sons,Inc.…

    • 662 Words
    • 2 Pages
    Good Essays