by Pete Pela
along every circuit. Any time a change is made, that change would again have to be documented, so in most cases the documentation isfluid.As a result, the challenge of documenting the physical layer is so significant it frequently is never overcome. Automation using the new breed of intelligent infrastructure management software provides an alternative. With this type of software, connections are discovered and then continually monitored electronically, from the server to the wiring closet to the wall jack, andfinallyto the end device, thereby generating documentation of the entire physical layer automatically (including overlaying it onto a CAD drawing of the building). MORE PRODUCTIVE, LESS COSTLY With this method, a single person can implement the intelligent infrastructure-management software, rather than tying up an entire department with physical traces. Since all the connections are traced at once, the amount of time from inception to completion is reduced. When changes are made, they are reflected in real time in the organization's records, thereby avoiding what are often long delays in manual-based systems. Automatically surveying the physical network, creating the documentation and transferring it to a CAD drawing removes the human error factor. More importantly, the organization winds up with an accurate record of all connectivity points and connections, meeting the ITIL best practices requirement of establishing and maintaining a CMDB. In some cases, obstacles to a completely automated solution may require the use of a mix of automated and manual solutions. Without comprehensive and accurate documentation of the physical layer, achieving a state of best practices as set forth in ITIL is not possible. Any ITIL processes and procedures developed need to assume that the necessary IT documentation exists and is accurate. This includes the physical layer. A good example is the IT planning that forms part of service and application delivery. A portion of provisioning new users requires connecting them to the network. This will be faster, more
Continued on page 34 www.comnews.com
CABLING INFRASTRUCTURE
reliable and more cost effective if the existing infrastructure is reused rather than installing new every time a new user connects to the network. Yet, without clear and accurate documentation, the most common course of action will be to drop new cable and install new devices. DOCUMENTATION IS IMPORTANT Even installations in a new building could be more complicated than necessary without accurate documentation. The connectivity paths selected may work, but may not be the most efficient or balanced, given the rest ofthe physical layout and connectivity. Diverse routing and load balancing are also important IT considerations. In addition, if the new installations are not continually documented, they will compound the problem in the future. Ongoing management is another area that will benefit from a well-documented physical layer. This includes knowing what is connected to what, and who is connected to it. Yet, many organizations lack this basic but essential information. In one real life example, a virus penetrates the network through an infected PC. As the virus propagates, the antivirus software sets off alerts identifying the IP address ofthe affected device (s). Then there is typically a race against time to either find the infected device (s) or disconnect them from the network at the switch. Without accurate documentation, this exercise is like trying to push water uphill. You simply will not be able to react fast enough to restrain damage to the infected PCs alone. If you have intelligent infrastructure management in place, you can quickly get to the physical location ofthe virus or the switch port connecting it to the network and stop the spread before it becomes widespread. In another scenario, many organizations have cabinets of switch ports connected to cables that once served users, but now essentially lead to nowhere. Yet, they appear to be utilized because a patch cord was not recovered. This is both a security vulnerability and under-utilization of the switch capacity. Without accurate documentation, IT is unaware of this spare capacity, and simply adds more switch ports as users are added. By becoming aware of unused capacity, the organization can improve security, reduce its cost and save rack space. Utilizing spare capacity also qualifies as a best practice.
www.comnew5.com