Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 12

5.

1 Computer Network Network Administration and


Administration Management
Network Management Objectives:

 Satisfy system users


Network Administration
–Performance
 The process of managing the
–Availability
computer network from planning,
installation, configuration, and –Reliability
maintenance
Provide cost-effective solutions to the
 Two kinds of network entities are
telecommunications needs of an
infrastructure and system
organization

Network Administrator
Network Administration and
 A network administrator is Management
responsible for the performance,
To meet the Network Management
reliability, and scalability of
objective you need the following:
corporate networks
 The typical task performed by a  Competent staff
network administrator includes:  Design and configuration
 Diagnostics
–Designing, deploying new
 Planning
networks deploying new devices
 Documentation
onto a network, setting and
 Standards and procedures
enforcing security policies for
network-connected elements

–Monitoring network performance


and reconfiguring network Network Management
elements to improve performance Organization
–Managing network-sourced events
 Control Center
–Tracking the configuration of a  Network monitors
network and the inventory of  Problem-reporting system
devices attached to it  Maintaining documentation
 Security
–Detecting failures
 Establishing procedures
 Release control
 Training
 Hacker- Someone who makes it
their business to break into
Network Management System networks they have no right to
access
 A combination of hardware and  Intruder- this is a general term for
software used by network anyone who attempts to log into a
supervisors to monitor and system without proper
administer the network authorization

Network Management Task Network Management Security


Basic Categories of Network Security
 Connect and disconnect
workstations
 Logon Security – a network’s first
 Diagnose and correct link problems
defense against security problems
 Add and delete users
 File System Security – controls
 Implement security
which file each user is able to
 Install and modify applications
access
 Performs system backups
 Data Communication Security –
 Recover from system failures
prevent unauthorized access to the
 Add new resources, such as a new
wires and devices that make up
server
the network and also includes the
 Maintain LAN documentation and
use of encryption
procedures

Network Management Security


Network Management Security
Personnel Involved in Network
 The sum of all measures taken to Security
prevent loss of any kind, when
correctly implemented, it ensures  Administration – will handle all
both protection and peace of mind aspects of security
 Auditing – can automatically log
certain events when they happen
 Physical Security- means the
Network Management Security security of the machines
themselves
Terminologies:  Human Security-encompasses
many issues, from unauthorized
 Account – a record containing (at break-ins to training users to
least) a user name or password avoiding security breaches
you create to give a user access to
the network (or a single machine)
–Theft of service – unauthorized user
can gain access and use the service
Network Management Security without paying

Planning a Security Approach  Unauthorized Disclosure

 Optimistic Approach- in which you


can initially give all users access
to everything, then explicitly deny Network Management Security
access to critical information
 Pessimistic Approach-in which you Security Problems and Their
initially restrict access to Consequences
everything, then explicitly enable
access to critical information  Information Warfare

–IP attacks – transmission of


malformed IP packets that exploit
known bugs in the receiving
Network Management Security
computer’s TCP/IP protocol stack
Security Policies
–Connection flooding –opening and
 A security policy should clearly dropping of TCP connections so
state the following: quickly that the target server spends
 Your organization’s basic security an inordinate amount of time dealing
approach (optimistic or with connection overhead
pessimistic) and the portions of the
network that are exceptions to the
rule
 Detail of all aspects of security, Network Management Security
including physical and human
Security Problems and Their
security
Consequences
 What access is required for each
employee or group of employees  Mail bombing- transmission of a
very large quantity of electronic
mail messages or the repeated
transmission of large messages to
Network Management Security a server, effectively crippling it.
 Accidental Data Loss
Security Problems and Their
Consequences

 Theft
Network Organization
–Theft of data – unauthorized users
Factors that Affects Network
can obtain copies of data stored on
Organization
your network
–Geographical requirements What is Backup?
–Number of organizations that must
 Backup is a duplicate copy of key
be networked
information such as hard
–Platform considerations copy(paper) and computer records
 A good set of backup procedures is
–Network Service Consideration necessary to ensure that data is
–Size of the network protected
 Data that should be backed up
regularly includes, but is not
limited to, email correspondence,
Requirements for Computer audit files, user information,
utilities and applications, operating
Network Setup
systems, financial data, and
databases, as well as customer
 User Requirements
lists.
 Hardware Requirements
 Software Requirements

Data Backup and Recovery Plan


Computer Network Setup and
 The following are some factors
Technologies that you might consider in creating
a backup and recovery plan
 Network Setup Types
 Schedule of Backup
 Network Technologies
–Backing up data should be done at a
convenient time

Computer Network Setup Types  Location of Backup Storage

 These are the types of computer in –It is highly recommended that


a network: another set of data backup is stored
remotely in case of a natural disaster
–Server
 Data Backup Contents
–Client

–Peer –This will help you decide if the data


needs to be backed up, how and when
–Enterprise it should be backed up
–Cloud Computing

–Hybrid or Combination
Data Backup and Recovery Plan
 Frequency of Backups Types of Backup Media
–The rate at which the data changes Listed below are common types of
affect the frequency the data should backup media available on the market
be backed up today:

 Time of Data Restoration  Tape Drives

–The planning of backup depends a lot –It can range in capacity from a few
on the time it takes to recover a megabytes to hundreds of gigabytes
system
 Disk Drives
 Types of Information contained in
the system –It offers high speed but expensive
backup media
–It is important to know what
information the data contains so that  Removable Disks
you can identify it as critical,
–These are fast, easy to install, and
confidential and etc.
portable
 Backup media

Types of Backup Media


Types of Backup
 Digital Audio Tape (DAT) Drives
 Incremental
–It has a larger capacity as compared
–An incremental backup backs up to the standard tape drive
only files that have changed or been
 Optical Jukeboxes
created since the last backup,
whether the backup itself is an
–Offers excellent amounts of secure
incremental or full backup
storage space ranging from 5 to 20
terabytes
 Differential
 Autoloader Tape System
–Differential backups back up files
that have changed or been created
–It uses a magazine of tapes to create
since the last full backup.
extended backup volumes
 Daily –It is recommended for a business
that needs a very high capacity
–Daily backups backup files that have
changed since the last daily backup
Factors in Choosing Backup Data Backup Security
Media
 There is a need to take steps to
Factors to consider in selecting an secure the backups if the
appropriate backup solution. information is confidential and
critical such as personal or
 Speed – it refers to how fast data proprietary information
can be backed up and recovered  Implement restrict access on the
 Reliability – it refers to the backup file and to a backup
reliability of the backup device and storage location
media  Store backups at an off-site facility
 Capacity – it refers to the amount
of data to back up given the time
and resource constraints
 Extensibility – the ability of the
What is Disaster Recovery?
backup solution to address the
current needs of the organization  Disaster Recovery – is the
 Cost – the cost of the backup restoration of system operation
solution and it should conform to after a disaster has occurred
the budget availability. which causes damage or physical
loss

Three types of sites:


Backup Tips
 Hot Site – it has the systems,
The following tips will help you to communications, and data on
successfully perform a data backup: standby thus allowing to get back
1.Provide a point person to perform online and resume operations
rollback in the case of an emergency within a few hours of failure
 Warm Site – it has and
2.Keep a record of the contents of the communications on standby but
backup media and date of the backup requires data to be restored first
3.Always verify backup before the operation can be
resumed again
4.Create a restore point  Cold Site – simply a physical
location that has all the resources
5.Encrypt and provide high permission
necessary to support the system
on the backup file

6.Create a detailed guideline on


backup recovery
Disaster Recovery Strategies

 Plan a backup schedule


–A backup plan should be based on –Corrupted backup media
the requirements for restoring data.

 Plan to back up open files

–Open files are files that are normally


skipped during the backup process

–These files are locked by a service or


application, such as an OS, word
processing, or application database

 The plan restores with Automated


System Recovery(ASR)

–ASR is a new tool to automatically


restore the system after a system
failure

Disaster Recovery Strategies

 Test restores

–Verify the backup by testing restore


is one of the most overlooked aspects
of disaster recovery planning

–Backup should be tested to validate


the backup and prepare for recovery

–By testing restore, restore


procedures can be modified and
documented conclusively

Disaster Recovery Strategies

 Some of the common problems


encountered during restoration are
the following:

–Incompatibility in hardware

–Missing hardware driver


–POTS network

–Mobile phones (wireless phones)

 Cellular (cell) phones - must be


within range of cell tower to
function
 Satellite phones - used where cell
service isn’t available
 Dual-mode phones - allow users to
make telephone calls on more than
one network

–Cellular / Wi-Fi dual-mode phones are


the most popular

5.2 Computer Network


Environment Mobile Phones

What Is a Network?

 Network: A connected system of


objects or people
 Computer network: A collection of
computers and other hardware
devices connected together so
users can share hardware,
software, and data, and
electronically communicate
 Computer networks converging Networking Applications
with telephone and other
communications networks  Television and radio broadcasting
 Networks range from small private  Global positioning system (GPS):
networks to the Internet (largest Uses satellites and a receiver to
network in the world) determine the exact geographic
location of the receiver

–Commonly used by individuals to


Networking Applications determine their exact location

–Used on the job by surveyors,


 The Internet
farmers, and fishermen
 Telephone service
–Used to guide vehicles and
equipment

–Used by the military to guide


munitions

–Geocaching

GPS

Networking Applications

 Videoconferencing: Use of
computers, video cameras,
microphones, and networking
technologies to conduct face to
face meetings over a network.
Networking Applications
–Online conferencing
 Monitoring systems: Monitor the (via the Internet)
status or location of individuals, –Telepresence
vehicles, assets, etc. videoconferencing

–RFID-based systems  Collaborative computing


(workgroup computing)
 Monitor the status of objects  Telecommuting

–GPS-based monitoring systems

 Monitor the physical location of


objects Networking Applications

–Electronic medical monitors and  Telemedicine: Use of networking


other types of home health monitoring technology to provide medical
information and services
–Sensor networks
–Remote monitoring and
consultations

–Remote diagnosis
Monitoring Systems
–Telesurgery
 Robot-assisted –Mesh networks: A network in which
 May be needed for space there are multiple connections
exploration between the devices on the network
so that messages can take any one of
several paths

–Some networks use a combination of


Network Characteristics topologies
 Wired vs. wireless networks

–Wired: A network in which computers


and other devices are connected to Network Topologies
the network via physical cables

 Found in homes, schools,


businesses, and government
facilities

–Wireless: A network in which


computers and other devices are
connected to the network without
physical cables; data is typically sent
via radio waves Network Architectures

 Found in homes, schools, and  Architecture: The way networks


businesses are designed to communicate
 Wi-Fi hotspots found in  Client-server networks
coffeehouses, businesses, airports,
–Client: Computer or another
hotels, and libraries
device on the network that requests
and utilizes network resources

–Server: Computer dedicated to


Network Topologies processing client requests

 Topology: How the devices in the


network (called nodes) are
arranged

–Star networks: A network that uses a


host device connected directly to
several other devices

–Bus networks: A network consisting


of a central cable to which all
network devices are attached
Network Architectures  Virtual private network (VPN):
Secure path over the Internet that
 Peer-to-peer (P2P) networks: All provides authorized users a secure
computers at the same level means of accessing a private
network via the Internet
–Internet P2P computing: Performed
via the Internet

Data Transmission
Characteristics

 Bandwidth: The amount of data


that can be transferred in a given
period of time

–Measured in bits per second (bps)

 Analog vs. digital signals (waves


vs. discrete)
Network Size and Coverage Area  Serial vs. parallel transmission

 Personal area network (PAN): –Serial = 1 bit


Connects an individual’s personal –Parallel = at least 1 byte at a time
devices that are located close
together.
 Local area network (LAN):
Connects devices located in a
Data Transmission
small geographic area
 Metropolitan area network (MAN):
Characteristics
Serves a metropolitan area
 Transmission timing
 Wide area network (WAN)
–Synchronous transmission (at
–Large geographic area
regular, specified intervals)

–Asynchronous transmission (sent


when ready)
Network Size and Coverage Area
–Isochronous transmission (sent at
the same time as other, related, data)
 Intranet: Private network set up by
an organization for use by its
employees
 Extranet: Intranet that is at least
partially accessible to authorized Transmission Timing
outsiders
packets and travel along with the
network separately

 Used to send data over the


Internet

–Broadcast: Data is sent out to all


other nodes on the network

 Primarily used with LANs

Data Transmission
Characteristics Type of Connections
 Transmission directions:

–Simplex transmission

 Data travels in a single direction


only

–Half-duplex transmission

 Data travels in either direction but


only one way at a time

–Full-duplex transmission

 Data travels in both directions,


both ways at the same time

Data Transmission
Characteristics

 Type of connections:

–Circuit-switched: Dedicated path


over a network is established and all
data follows that path

–Packet-switched: Messages are


separated into small units called

You might also like