BITC 311 LECTURE 1

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 6

BITC 311 : NETWORK DESIGN AND ADMINISTRATION – LECTURE 1

Course Code and BITC 311:NETWORK ADMINISTRATION


Name
Credit Units 3
Pre-requisites Computer Networks

Purpose of the
Course
Expected Learning At the end of the course the learner is able to:
Outcomes 1. Apply the basic techniques of managing business by using
network operating systems such as Novell and Unix.
2. Appreciate the various networking standards.
3. Set-up and configure a computer network.
Course Content 1. Overview of Networks and Network operating system.
2. NOS core technologies and administration. instal-
lation and configuration.
3. Design and implementation of data traffics flow in
a large enterprise LAN. Flat or hierarchical de-
sign(core, distributed and access)
4. IP addressing system and sub-netting.
5. Access rights and permissions an enterprise management.
6. 7-layer model , Protocols(routing and switching)
7. Network management and monitoring tools, analysis and design.
8. Budgets and staffing.
Mode of Delivery Lectures, tutorials, seminars.

Instructional Projectors, computers, whiteboards and materials.


Material and/or
Equipment
Course Examinations 70%
Assessment CATS 30%
Recommended James F. Kurose & Keith W. Ross, “Computer Networking : A Top-
Reference Material Down Approach ”, 6th edition , Pearson / Addison Wesley 2013
Kroenke, David and Auer, David. Database Processing: Fundamentals,
Design, and Implementation (12th Edition). Upper Saddle River:
Pearson Prentice Hall, 2012

Training and certifications specifically for network administrators


The Certified Wireless Network Administrator (CWNA)
Cisco Career Certifications
Microsoft
Novell
Red Hat Certification Program offers IT professional certifications for Red Hat products and general Linux
related skills such as system administration.

1
LECTURE 1: INTRODUCTION TO NETWORKS

A computer network is a collection of interconnected computing devices for the sake of communication/
data exchange. These devices include:- computers, phones servers, routers, switches, and various other
hardware and software components, that are linked together to facilitate the sharing of resources and
information.
These devices are connected through various communication channels, such as wired or wireless
connections.
Key characteristics and components of a computer network include:
Nodes: These are the individual devices or computers connected to the network. Nodes can be servers that
provide services, workstations used by end-users, printers, and more.
Links: Links represent the physical or logical connections between nodes. These connections can be wired
or wireless and vary in terms of speed and capacity.
Topology: The arrangement of nodes and links in a network is known as its topology. Common topologies
include bus, star, ring, mesh, and hybrid configurations.
Protocols: Computer networks rely on communication protocols, which are a set of rules and conventions
that govern how data is transmitted, received, and processed within the network. The Transmission Control
Protocol/Internet Protocol (TCP/IP) is the most widely used protocol suite on the internet.
Data Transmission: Networks enable the exchange of data and information between connected devices.
This includes the transmission of files, emails, web pages, and various other types of digital content.
Resource Sharing: Networks allow for the sharing of hardware and software resources. This can include
sharing files and printers, accessing shared databases, and utilizing centralized services like email and web
servers.
Scalability: Networks can be designed to be scalable, allowing for the addition of new devices and
resources as an organization or network's needs grow.
Security: Network security is crucial to protect data and resources from unauthorized access, data
breaches, and cyberattacks. Security measures include firewalls, encryption, access controls, and intrusion
detection systems.
Also:-
 May be difficult to set up - A complex computer network may be difficult to set up. It may be
costly to set up an effective computer network in a large organization.
 May interfere with other technologies

TERMS USED IN NETWORKS


Intranets
An intranet is a set of networks that are under the control of a single administrative entity. The intranet uses
the IP protocol and IP-based tools such as web browsers and file transfer applications. The administrative
entity limits use of the intranet to its authorized users.

Extranet
An extranet is a network that is also under the administrative control of a single organization, but supports
a limited connection to a specific external network. For example, an organization may provide access to
some aspects of its intranet to share data with its business partners or customers.

Internet
The Internet is the largest example of an internetwork. It is a global system of interconnected
governmental, academic, corporate, public, and private computer networks.

Darknet
Is an overlay network, typically running on the internet that is only accessible through specialized software.

Routing
Routing is the process of selecting paths in a network along which to send network traffic. Routing is
performed for many kinds of networks, including circuit switching networks and packet switched networks.

2
Why networks are critically important in modern computing:
 Resource Sharing: Networks enable the sharing of hardware and software resources, such as printers,
files, and applications. This allows multiple users and devices to access and utilize these resources
efficiently.
 Data Transfer and Communication: Networks facilitate the rapid and seamless exchange of data,
information, and messages. This is vital for communication through email, messaging platforms, video
conferencing, and collaboration tools.
 Remote Access: Networks enable remote access to resources and systems, allowing employees and
users to work from different locations. This has become especially crucial with the rise of remote work
and telecommuting.
 Internet Connectivity: The internet itself is a global network of networks. Access to the internet is
essential for various online services, research, education, e-commerce, and staying connected with the
global community.
 Cloud Computing: Cloud computing relies on networks to deliver a wide range of services, including
Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
Organizations leverage cloud resources for scalability, flexibility, and cost-effectiveness.
 Data Storage and Backup: Networks enable data storage and backup solutions, such as network-
attached storage (NAS) and cloud storage. Data can be securely stored, retrieved, and synchronized
across devices and locations.
 Big Data and Analytics: Modern data analysis and business intelligence heavily depend on networks
to collect, transmit, and process vast amounts of data from various sources for informed decision-
making.
 E-commerce and Online Services: Online businesses and service providers rely on networks to offer
products and services to customers, manage transactions, and maintain digital storefronts.
 IoT (Internet of Things): IoT devices communicate over networks, collecting and transmitting data
for monitoring and control of various systems, from smart homes to industrial processes.
 Social Media and Content Sharing: Networks are the foundation of social media platforms and
content-sharing websites, enabling users to connect, share information, and engage with others.
 Cybersecurity and Network Security: Protecting networks from cyber threats is paramount in
modern computing. Security measures like firewalls, intrusion detection systems, and encryption are
essential to safeguard data and resources.
 Globalization and Collaboration: Networks facilitate global collaboration among businesses,
researchers, and individuals, breaking down geographical barriers and fostering innovation and
cooperation.
 Education and Research: Educational institutions and researchers use networks to access digital
libraries, share findings, collaborate on projects, and facilitate online learning.
 Supply Chain and Logistics: Networks enable real-time tracking of inventory, shipments, and
logistics, enhancing the efficiency and transparency of supply chain operations.
 Entertainment and Streaming: Streaming services rely on networks to deliver video, music, and
other content to consumers on-demand, shaping modern entertainment consumption.

NETWORK ADMINISTRATION
Network administration involves a wide array of operational tasks that help a network to run smoothly and
efficiently.
The main tasks associated with network administration include:
 Design, installation and evaluation of the network
 Execution and administration of regular backups
 Creation of precise technical documentation, such as network diagrams, network cabling
documents, etc.
 Provision for precise authentication to access network resources
 Provision for troubleshooting assistance
 Administration of network security, including intrusion detection
 Network monitoring
 Keeping an eye out for needed updates
 E-mail and Internet filters
 Evaluating implementing network management software
A network administrator is an individual that is responsible for the maintenance of computer hardware

3
and software systems that make up a computer network including the maintenance and monitoring of active
data network or converged infrastructure and related network equipment.
A system administrator, or sysadmin, is a person who is responsible for the upkeep, configuration, and
reliable operation of computer systems; especially multi-user computers, such as servers. The system ad-
ministrator seeks to ensure that the uptime, performance, resources, and security of the computers he or she
manages meet the needs of the users, without exceeding the budget.

CHALLENGES OF ADMINISTRATION
 Designing Logical, Efficient networks
 Deploying & updating many machines
 Deciding what services are needed
 know the business tasks & customers
 Planning and implementing adequate security
 Providing comfortable User environment
 Fixing errors and problems
 Keeping track of and be able to use networking knowledge

DESIGN GOALS
Good designs should:
 Deliver services requested by users
 Deliver acceptable throughput and response times
 Be within budget and maximize cost efficiencies
 Be reliable
 Be expandable without major redesign
 Be manageable by maintenance and support staff
 Be well documented

DESIGN CHOICES
 Balance of distribution
 Level of transparency
 Security
 Connectivity technology

NETWORK OPERATING SYSTEM (NOS)


 A network operating system (NOS) is a piece of software that controls a network and its message
traffic and queues, controls access by multiple users to network resources such as files, and provides
for certain administrative functions, including security.
 The network operating system is designed to allow shared file and printer access among multiple
computers in a network, typically a local area network (LAN) or to other networks.
 Network Operating Systems can be embedded in a router or hardware firewall that operates the
functions in the network layer (layer 3) of the OSI model.
 They also allow a network administrator to organize resources, control access, and ensure that the net-
work is operating efficiently.
 Modern Operating Systems contain built-in software designed to simplify networking of a computer.
Typical Operating Systems software includes an implementation of TCP/IP protocol stack and related
utility programs like ping and traceroute.
 This includes the necessary device drivers and other software to automatically enable a device's
Ethernet interface. Mobile devices also normally provide the programs needed to enable Wi-Fi,
Bluetooth, or other wireless connectivity.

Examples:
 JUNOS, used in routers and switches from Juniper Networks,
 Cisco IOS
 TiMOS, used in routers from Alcatel-Lucent
 VRP (Versatile Routing Platform), used in routers from Huawei
 RouterOS, software which turns a PC or MikroTik hardware into a dedicated router
 ZyNOS, used in network devices made by ZyXEL.

4
 ExtremeXOS, used in network devices made by Extreme Networks. Also called EXOS.
 Embedded_linux, in distributions like Openwrt and DD-WRT which run on low-cost platforms
such as the Linksys Linksys_WRT54G.

FEATURES OF NETWORK OPERATING SYSTEM ARE:


 Provide basic operating system features such as support for processors, protocols, automatic hardware
detection and support multi-processing of applications
 Security features such as authentication, authorization, logon restrictions and access control
 Support Internetworking such as routing and WAN ports
 User management and support for logon and logoff, remote access; system management, administra-
tion and auditing tools with graphic interfaces
 Clustering capabilities; fault tolerant and high availability systems
 Providing access to remote printers, managing which users are using which printers when, managing
how print jobs are queued, and recognizing when devices aren't available to the network
 Providing routing services, including support for major networking protocols, so that the operating sys-
tem knows what data to send where
 Monitoring the system and security, so as to provide proper security against viruses, hackers, and data
corruption.
 Providing basic network administration utilities (such as SNMP, or Simple Network Management Pro-
tocol), enabling an administrator to perform tasks involving managing network resources and users.

NETWORK SECURITY ESSENTIALS


Network security is essential to protect your organization's data, systems, and resources from unauthorized
access, cyber-attacks, and data breaches. Implementing network security best practices helps minimize
risks and ensures the confidentiality, integrity, and availability of your network and the data it carries.
Here are some key network security best practices:

Firewall Implementation:
 Use a firewall to filter incoming and outgoing traffic, allowing only necessary and trusted traffic to
pass.
 Employ both hardware and software firewalls for layered protection.
 Regularly update and configure firewall rules to reflect your organization's security policies.

Network Segmentation:
 Divide your network into segments or zones based on security requirements.
 Isolate sensitive systems and data from less critical parts of the network.
 Implement access controls and firewalls between network segments.

Access Control:
 Enforce strong password policies for all network accounts.
 Implement multi-factor authentication (MFA) wherever possible.
 Assign and regularly review user access rights, ensuring the principle of least privilege (users have
only the permissions they need).

Regular Patch Management:


 Keep all network devices, including servers, routers, switches, and software, up to date with security
patches.
 Establish a patch management process that includes testing patches before deployment.

Intrusion Detection and Prevention:


 Deploy intrusion detection and prevention systems (IDS/IPS) to monitor network traffic for suspicious
activities.
 Configure IDS/IPS to alert and block potential threats automatically.

Encryption:
 Use encryption protocols (e.g., SSL/TLS for web traffic) to protect data in transit.
 Encrypt sensitive data at rest using strong encryption methods.
 Implement end-to-end encryption for communication and file sharing.

5
Network Monitoring and Logging:
 Continuously monitor network traffic and system logs for signs of unauthorized access or unusual be-
havior.
 Retain and securely store logs for auditing and forensics purposes.

Vulnerability Management:
 Regularly scan the network for vulnerabilities using tools like vulnerability scanners.
 Prioritize and remediate vulnerabilities based on their criticality.
Security Awareness Training:
 Educate employees and network users about security risks and best practices.
 Conduct regular security awareness training sessions to keep users informed about current threats.
Incident Response Plan:
 Develop and maintain an incident response plan that outlines procedures to follow in the event of a se-
curity incident.
 Test the plan through tabletop exercises to ensure readiness.
Physical Security:
 Secure physical access to network infrastructure, data centers, and server rooms.
 Implement access controls, surveillance, and environmental controls to protect hardware.
Backup and Recovery:
 Regularly back up critical data and configurations.
 Test data recovery processes to ensure data can be restored in case of data loss or ransomware attacks.
Vendor Security Evaluation:
 Assess the security practices of third-party vendors and service providers that connect to your network.
 Ensure they meet security standards and compliance requirements.
Compliance and Regulations:
 Stay informed about industry-specific regulations and compliance requirements (e.g., GDPR, HIPAA)
and ensure your network adheres to them.
Regular Security Audits:
 Conduct periodic security audits and penetration testing to identify vulnerabilities and weaknesses.
Network Documentation:
 Maintain up-to-date documentation of network configurations, policies, and procedures.
 This documentation is crucial for troubleshooting and responding to security incidents.
Zero Trust Security Model:
 Adopt a "zero trust" approach where trust is never assumed, and verification is required from anyone
trying to access resources inside or outside the network.
 Network security is an ongoing process that requires continuous monitoring, updates, and adaptation to
evolving threats.
 A comprehensive and proactive network security strategy is crucial for safeguarding your organiza-
tion's digital assets and maintaining the trust of your stakeholders.

CAT 1
1. Explain the challenges involved in the configuration and administration of a Network Operating System in a
large enterprise network. [5 Marks]
2. Given the Class C network of 204.15.5.0/24, subnet the network in order to accommodate 28 hosts per sub-
net. Give the range of the first two useable subnets. [5 Marks]
3. Explain the primary technologies used in managing user accounts in a NOS environment? [5 Marks]
4. Most organizations are in the process of migrating from IPv4 to IPv6. Discuss differences between IPv4 and
IPv6 [5 Marks]

You might also like