About Configuration Identification

Configuration identification (CI) involves identifying the components of the network, uniquely identifying the individual components, and making them accessible in some form.  A proper configuration identification schema identifies each component of the network and provides traceability between the component and its configuration status information.  Proper configuration identification answers the following questions:
·         What is the configuration of the network?
·         What are the components of the network?
·         What are the versions of the network components?

The major activities of configuration identification are:
·         Selecting network components to be placed under CM control
·         Creating an identification scheme for the components to uniquely identify each individual component
The following sections present the configuration identification activities for the SN.

Select Network Components

This plan addresses the CM of the SN network infrastructure – switches, routers, and hubs.  Specifically excluded from this plan are network server hardware and operating systems.

Architecture Group, in conjunction with the  CCB, will determine the network hardware components to be placed under CM.  The following is a preliminary list of SN network hardware items to be controlled:
§  Cisco 7000 Series Routers
§  Cisco 5000 Series Routers
§  Cisco 4000 Series Routers
§  Cisco 3000 Series Routers
§  Cisco 2500 Series Routers
§  Ascend MAX Inverse Multiplexer
§  I-MUX Dialup
§  CDDI/FDDI Concentrators
§  Networth 4000 Concentrators
§  Bay Stack Hubs
§  Acculan Hubs

Architecture Group, in conjunction with the SN CCB, will determine the network software components to be placed under CM.   The following is a preliminary list of the SN network software items to be controlled:
§  HP Open View

Uniquely Identify Each Component


Applying CI naming involves setting naming standards based on criteria about the component’s location, function, etc.  An example may include naming a router based on the location, model, and function, such as B9-C7000-FIN (for this example, a CISCO 7000 router located in building 9, used for Financial communication).  The key in CI naming is setting a usable naming standard that can be applied across the entire enterprise of components within the CM scope.

0 komentar:

Posting Komentar

 

Serba Ada Blog Copyright © 2011-2012 | Powered by Blogger