BITC 311 LECTURE 1
BITC 311 LECTURE 1
BITC 311 LECTURE 1
Purpose of the
Course
Expected Learning At the end of the course the learner is able to:
Outcomes 1. Apply the basic techniques of managing business by using
network operating systems such as Novell and Unix.
2. Appreciate the various networking standards.
3. Set-up and configure a computer network.
Course Content 1. Overview of Networks and Network operating system.
2. NOS core technologies and administration. instal-
lation and configuration.
3. Design and implementation of data traffics flow in
a large enterprise LAN. Flat or hierarchical de-
sign(core, distributed and access)
4. IP addressing system and sub-netting.
5. Access rights and permissions an enterprise management.
6. 7-layer model , Protocols(routing and switching)
7. Network management and monitoring tools, analysis and design.
8. Budgets and staffing.
Mode of Delivery Lectures, tutorials, seminars.
1
LECTURE 1: INTRODUCTION TO NETWORKS
A computer network is a collection of interconnected computing devices for the sake of communication/
data exchange. These devices include:- computers, phones servers, routers, switches, and various other
hardware and software components, that are linked together to facilitate the sharing of resources and
information.
These devices are connected through various communication channels, such as wired or wireless
connections.
Key characteristics and components of a computer network include:
Nodes: These are the individual devices or computers connected to the network. Nodes can be servers that
provide services, workstations used by end-users, printers, and more.
Links: Links represent the physical or logical connections between nodes. These connections can be wired
or wireless and vary in terms of speed and capacity.
Topology: The arrangement of nodes and links in a network is known as its topology. Common topologies
include bus, star, ring, mesh, and hybrid configurations.
Protocols: Computer networks rely on communication protocols, which are a set of rules and conventions
that govern how data is transmitted, received, and processed within the network. The Transmission Control
Protocol/Internet Protocol (TCP/IP) is the most widely used protocol suite on the internet.
Data Transmission: Networks enable the exchange of data and information between connected devices.
This includes the transmission of files, emails, web pages, and various other types of digital content.
Resource Sharing: Networks allow for the sharing of hardware and software resources. This can include
sharing files and printers, accessing shared databases, and utilizing centralized services like email and web
servers.
Scalability: Networks can be designed to be scalable, allowing for the addition of new devices and
resources as an organization or network's needs grow.
Security: Network security is crucial to protect data and resources from unauthorized access, data
breaches, and cyberattacks. Security measures include firewalls, encryption, access controls, and intrusion
detection systems.
Also:-
May be difficult to set up - A complex computer network may be difficult to set up. It may be
costly to set up an effective computer network in a large organization.
May interfere with other technologies
Extranet
An extranet is a network that is also under the administrative control of a single organization, but supports
a limited connection to a specific external network. For example, an organization may provide access to
some aspects of its intranet to share data with its business partners or customers.
Internet
The Internet is the largest example of an internetwork. It is a global system of interconnected
governmental, academic, corporate, public, and private computer networks.
Darknet
Is an overlay network, typically running on the internet that is only accessible through specialized software.
Routing
Routing is the process of selecting paths in a network along which to send network traffic. Routing is
performed for many kinds of networks, including circuit switching networks and packet switched networks.
2
Why networks are critically important in modern computing:
Resource Sharing: Networks enable the sharing of hardware and software resources, such as printers,
files, and applications. This allows multiple users and devices to access and utilize these resources
efficiently.
Data Transfer and Communication: Networks facilitate the rapid and seamless exchange of data,
information, and messages. This is vital for communication through email, messaging platforms, video
conferencing, and collaboration tools.
Remote Access: Networks enable remote access to resources and systems, allowing employees and
users to work from different locations. This has become especially crucial with the rise of remote work
and telecommuting.
Internet Connectivity: The internet itself is a global network of networks. Access to the internet is
essential for various online services, research, education, e-commerce, and staying connected with the
global community.
Cloud Computing: Cloud computing relies on networks to deliver a wide range of services, including
Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
Organizations leverage cloud resources for scalability, flexibility, and cost-effectiveness.
Data Storage and Backup: Networks enable data storage and backup solutions, such as network-
attached storage (NAS) and cloud storage. Data can be securely stored, retrieved, and synchronized
across devices and locations.
Big Data and Analytics: Modern data analysis and business intelligence heavily depend on networks
to collect, transmit, and process vast amounts of data from various sources for informed decision-
making.
E-commerce and Online Services: Online businesses and service providers rely on networks to offer
products and services to customers, manage transactions, and maintain digital storefronts.
IoT (Internet of Things): IoT devices communicate over networks, collecting and transmitting data
for monitoring and control of various systems, from smart homes to industrial processes.
Social Media and Content Sharing: Networks are the foundation of social media platforms and
content-sharing websites, enabling users to connect, share information, and engage with others.
Cybersecurity and Network Security: Protecting networks from cyber threats is paramount in
modern computing. Security measures like firewalls, intrusion detection systems, and encryption are
essential to safeguard data and resources.
Globalization and Collaboration: Networks facilitate global collaboration among businesses,
researchers, and individuals, breaking down geographical barriers and fostering innovation and
cooperation.
Education and Research: Educational institutions and researchers use networks to access digital
libraries, share findings, collaborate on projects, and facilitate online learning.
Supply Chain and Logistics: Networks enable real-time tracking of inventory, shipments, and
logistics, enhancing the efficiency and transparency of supply chain operations.
Entertainment and Streaming: Streaming services rely on networks to deliver video, music, and
other content to consumers on-demand, shaping modern entertainment consumption.
NETWORK ADMINISTRATION
Network administration involves a wide array of operational tasks that help a network to run smoothly and
efficiently.
The main tasks associated with network administration include:
Design, installation and evaluation of the network
Execution and administration of regular backups
Creation of precise technical documentation, such as network diagrams, network cabling
documents, etc.
Provision for precise authentication to access network resources
Provision for troubleshooting assistance
Administration of network security, including intrusion detection
Network monitoring
Keeping an eye out for needed updates
E-mail and Internet filters
Evaluating implementing network management software
A network administrator is an individual that is responsible for the maintenance of computer hardware
3
and software systems that make up a computer network including the maintenance and monitoring of active
data network or converged infrastructure and related network equipment.
A system administrator, or sysadmin, is a person who is responsible for the upkeep, configuration, and
reliable operation of computer systems; especially multi-user computers, such as servers. The system ad-
ministrator seeks to ensure that the uptime, performance, resources, and security of the computers he or she
manages meet the needs of the users, without exceeding the budget.
CHALLENGES OF ADMINISTRATION
Designing Logical, Efficient networks
Deploying & updating many machines
Deciding what services are needed
know the business tasks & customers
Planning and implementing adequate security
Providing comfortable User environment
Fixing errors and problems
Keeping track of and be able to use networking knowledge
DESIGN GOALS
Good designs should:
Deliver services requested by users
Deliver acceptable throughput and response times
Be within budget and maximize cost efficiencies
Be reliable
Be expandable without major redesign
Be manageable by maintenance and support staff
Be well documented
DESIGN CHOICES
Balance of distribution
Level of transparency
Security
Connectivity technology
Examples:
JUNOS, used in routers and switches from Juniper Networks,
Cisco IOS
TiMOS, used in routers from Alcatel-Lucent
VRP (Versatile Routing Platform), used in routers from Huawei
RouterOS, software which turns a PC or MikroTik hardware into a dedicated router
ZyNOS, used in network devices made by ZyXEL.
4
ExtremeXOS, used in network devices made by Extreme Networks. Also called EXOS.
Embedded_linux, in distributions like Openwrt and DD-WRT which run on low-cost platforms
such as the Linksys Linksys_WRT54G.
Firewall Implementation:
Use a firewall to filter incoming and outgoing traffic, allowing only necessary and trusted traffic to
pass.
Employ both hardware and software firewalls for layered protection.
Regularly update and configure firewall rules to reflect your organization's security policies.
Network Segmentation:
Divide your network into segments or zones based on security requirements.
Isolate sensitive systems and data from less critical parts of the network.
Implement access controls and firewalls between network segments.
Access Control:
Enforce strong password policies for all network accounts.
Implement multi-factor authentication (MFA) wherever possible.
Assign and regularly review user access rights, ensuring the principle of least privilege (users have
only the permissions they need).
Encryption:
Use encryption protocols (e.g., SSL/TLS for web traffic) to protect data in transit.
Encrypt sensitive data at rest using strong encryption methods.
Implement end-to-end encryption for communication and file sharing.
5
Network Monitoring and Logging:
Continuously monitor network traffic and system logs for signs of unauthorized access or unusual be-
havior.
Retain and securely store logs for auditing and forensics purposes.
Vulnerability Management:
Regularly scan the network for vulnerabilities using tools like vulnerability scanners.
Prioritize and remediate vulnerabilities based on their criticality.
Security Awareness Training:
Educate employees and network users about security risks and best practices.
Conduct regular security awareness training sessions to keep users informed about current threats.
Incident Response Plan:
Develop and maintain an incident response plan that outlines procedures to follow in the event of a se-
curity incident.
Test the plan through tabletop exercises to ensure readiness.
Physical Security:
Secure physical access to network infrastructure, data centers, and server rooms.
Implement access controls, surveillance, and environmental controls to protect hardware.
Backup and Recovery:
Regularly back up critical data and configurations.
Test data recovery processes to ensure data can be restored in case of data loss or ransomware attacks.
Vendor Security Evaluation:
Assess the security practices of third-party vendors and service providers that connect to your network.
Ensure they meet security standards and compliance requirements.
Compliance and Regulations:
Stay informed about industry-specific regulations and compliance requirements (e.g., GDPR, HIPAA)
and ensure your network adheres to them.
Regular Security Audits:
Conduct periodic security audits and penetration testing to identify vulnerabilities and weaknesses.
Network Documentation:
Maintain up-to-date documentation of network configurations, policies, and procedures.
This documentation is crucial for troubleshooting and responding to security incidents.
Zero Trust Security Model:
Adopt a "zero trust" approach where trust is never assumed, and verification is required from anyone
trying to access resources inside or outside the network.
Network security is an ongoing process that requires continuous monitoring, updates, and adaptation to
evolving threats.
A comprehensive and proactive network security strategy is crucial for safeguarding your organiza-
tion's digital assets and maintaining the trust of your stakeholders.
CAT 1
1. Explain the challenges involved in the configuration and administration of a Network Operating System in a
large enterprise network. [5 Marks]
2. Given the Class C network of 204.15.5.0/24, subnet the network in order to accommodate 28 hosts per sub-
net. Give the range of the first two useable subnets. [5 Marks]
3. Explain the primary technologies used in managing user accounts in a NOS environment? [5 Marks]
4. Most organizations are in the process of migrating from IPv4 to IPv6. Discuss differences between IPv4 and
IPv6 [5 Marks]