5.
1 Computer Network Network Administration and
Administration Management
Network Management Objectives:
Satisfy system users
Network Administration
–Performance
The process of managing the
–Availability
computer network from planning,
installation, configuration, and –Reliability
maintenance
Provide cost-effective solutions to the
Two kinds of network entities are
telecommunications needs of an
infrastructure and system
organization
Network Administrator
Network Administration and
A network administrator is Management
responsible for the performance,
To meet the Network Management
reliability, and scalability of
objective you need the following:
corporate networks
The typical task performed by a Competent staff
network administrator includes: Design and configuration
Diagnostics
–Designing, deploying new
Planning
networks deploying new devices
Documentation
onto a network, setting and
Standards and procedures
enforcing security policies for
network-connected elements
–Monitoring network performance
and reconfiguring network Network Management
elements to improve performance Organization
–Managing network-sourced events
Control Center
–Tracking the configuration of a Network monitors
network and the inventory of Problem-reporting system
devices attached to it Maintaining documentation
Security
–Detecting failures
Establishing procedures
Release control
Training
Hacker- Someone who makes it
their business to break into
Network Management System networks they have no right to
access
A combination of hardware and Intruder- this is a general term for
software used by network anyone who attempts to log into a
supervisors to monitor and system without proper
administer the network authorization
Network Management Task Network Management Security
Basic Categories of Network Security
Connect and disconnect
workstations
Logon Security – a network’s first
Diagnose and correct link problems
defense against security problems
Add and delete users
File System Security – controls
Implement security
which file each user is able to
Install and modify applications
access
Performs system backups
Data Communication Security –
Recover from system failures
prevent unauthorized access to the
Add new resources, such as a new
wires and devices that make up
server
the network and also includes the
Maintain LAN documentation and
use of encryption
procedures
Network Management Security
Network Management Security
Personnel Involved in Network
The sum of all measures taken to Security
prevent loss of any kind, when
correctly implemented, it ensures Administration – will handle all
both protection and peace of mind aspects of security
Auditing – can automatically log
certain events when they happen
Physical Security- means the
Network Management Security security of the machines
themselves
Terminologies: Human Security-encompasses
many issues, from unauthorized
Account – a record containing (at break-ins to training users to
least) a user name or password avoiding security breaches
you create to give a user access to
the network (or a single machine)
–Theft of service – unauthorized user
can gain access and use the service
Network Management Security without paying
Planning a Security Approach Unauthorized Disclosure
Optimistic Approach- in which you
can initially give all users access
to everything, then explicitly deny Network Management Security
access to critical information
Pessimistic Approach-in which you Security Problems and Their
initially restrict access to Consequences
everything, then explicitly enable
access to critical information Information Warfare
–IP attacks – transmission of
malformed IP packets that exploit
known bugs in the receiving
Network Management Security
computer’s TCP/IP protocol stack
Security Policies
–Connection flooding –opening and
A security policy should clearly dropping of TCP connections so
state the following: quickly that the target server spends
Your organization’s basic security an inordinate amount of time dealing
approach (optimistic or with connection overhead
pessimistic) and the portions of the
network that are exceptions to the
rule
Detail of all aspects of security, Network Management Security
including physical and human
Security Problems and Their
security
Consequences
What access is required for each
employee or group of employees Mail bombing- transmission of a
very large quantity of electronic
mail messages or the repeated
transmission of large messages to
Network Management Security a server, effectively crippling it.
Accidental Data Loss
Security Problems and Their
Consequences
Theft
Network Organization
–Theft of data – unauthorized users
Factors that Affects Network
can obtain copies of data stored on
Organization
your network
–Geographical requirements What is Backup?
–Number of organizations that must
Backup is a duplicate copy of key
be networked
information such as hard
–Platform considerations copy(paper) and computer records
A good set of backup procedures is
–Network Service Consideration necessary to ensure that data is
–Size of the network protected
Data that should be backed up
regularly includes, but is not
limited to, email correspondence,
Requirements for Computer audit files, user information,
utilities and applications, operating
Network Setup
systems, financial data, and
databases, as well as customer
User Requirements
lists.
Hardware Requirements
Software Requirements
Data Backup and Recovery Plan
Computer Network Setup and
The following are some factors
Technologies that you might consider in creating
a backup and recovery plan
Network Setup Types
Schedule of Backup
Network Technologies
–Backing up data should be done at a
convenient time
Computer Network Setup Types Location of Backup Storage
These are the types of computer in –It is highly recommended that
a network: another set of data backup is stored
remotely in case of a natural disaster
–Server
Data Backup Contents
–Client
–Peer –This will help you decide if the data
needs to be backed up, how and when
–Enterprise it should be backed up
–Cloud Computing
–Hybrid or Combination
Data Backup and Recovery Plan
Frequency of Backups Types of Backup Media
–The rate at which the data changes Listed below are common types of
affect the frequency the data should backup media available on the market
be backed up today:
Time of Data Restoration Tape Drives
–The planning of backup depends a lot –It can range in capacity from a few
on the time it takes to recover a megabytes to hundreds of gigabytes
system
Disk Drives
Types of Information contained in
the system –It offers high speed but expensive
backup media
–It is important to know what
information the data contains so that Removable Disks
you can identify it as critical,
–These are fast, easy to install, and
confidential and etc.
portable
Backup media
Types of Backup Media
Types of Backup
Digital Audio Tape (DAT) Drives
Incremental
–It has a larger capacity as compared
–An incremental backup backs up to the standard tape drive
only files that have changed or been
Optical Jukeboxes
created since the last backup,
whether the backup itself is an
–Offers excellent amounts of secure
incremental or full backup
storage space ranging from 5 to 20
terabytes
Differential
Autoloader Tape System
–Differential backups back up files
that have changed or been created
–It uses a magazine of tapes to create
since the last full backup.
extended backup volumes
Daily –It is recommended for a business
that needs a very high capacity
–Daily backups backup files that have
changed since the last daily backup
Factors in Choosing Backup Data Backup Security
Media
There is a need to take steps to
Factors to consider in selecting an secure the backups if the
appropriate backup solution. information is confidential and
critical such as personal or
Speed – it refers to how fast data proprietary information
can be backed up and recovered Implement restrict access on the
Reliability – it refers to the backup file and to a backup
reliability of the backup device and storage location
media Store backups at an off-site facility
Capacity – it refers to the amount
of data to back up given the time
and resource constraints
Extensibility – the ability of the
What is Disaster Recovery?
backup solution to address the
current needs of the organization Disaster Recovery – is the
Cost – the cost of the backup restoration of system operation
solution and it should conform to after a disaster has occurred
the budget availability. which causes damage or physical
loss
Three types of sites:
Backup Tips
Hot Site – it has the systems,
The following tips will help you to communications, and data on
successfully perform a data backup: standby thus allowing to get back
1.Provide a point person to perform online and resume operations
rollback in the case of an emergency within a few hours of failure
Warm Site – it has and
2.Keep a record of the contents of the communications on standby but
backup media and date of the backup requires data to be restored first
3.Always verify backup before the operation can be
resumed again
4.Create a restore point Cold Site – simply a physical
location that has all the resources
5.Encrypt and provide high permission
necessary to support the system
on the backup file
6.Create a detailed guideline on
backup recovery
Disaster Recovery Strategies
Plan a backup schedule
–A backup plan should be based on –Corrupted backup media
the requirements for restoring data.
Plan to back up open files
–Open files are files that are normally
skipped during the backup process
–These files are locked by a service or
application, such as an OS, word
processing, or application database
The plan restores with Automated
System Recovery(ASR)
–ASR is a new tool to automatically
restore the system after a system
failure
Disaster Recovery Strategies
Test restores
–Verify the backup by testing restore
is one of the most overlooked aspects
of disaster recovery planning
–Backup should be tested to validate
the backup and prepare for recovery
–By testing restore, restore
procedures can be modified and
documented conclusively
Disaster Recovery Strategies
Some of the common problems
encountered during restoration are
the following:
–Incompatibility in hardware
–Missing hardware driver
–POTS network
–Mobile phones (wireless phones)
Cellular (cell) phones - must be
within range of cell tower to
function
Satellite phones - used where cell
service isn’t available
Dual-mode phones - allow users to
make telephone calls on more than
one network
–Cellular / Wi-Fi dual-mode phones are
the most popular
5.2 Computer Network
Environment Mobile Phones
What Is a Network?
Network: A connected system of
objects or people
Computer network: A collection of
computers and other hardware
devices connected together so
users can share hardware,
software, and data, and
electronically communicate
Computer networks converging Networking Applications
with telephone and other
communications networks Television and radio broadcasting
Networks range from small private Global positioning system (GPS):
networks to the Internet (largest Uses satellites and a receiver to
network in the world) determine the exact geographic
location of the receiver
–Commonly used by individuals to
Networking Applications determine their exact location
–Used on the job by surveyors,
The Internet
farmers, and fishermen
Telephone service
–Used to guide vehicles and
equipment
–Used by the military to guide
munitions
–Geocaching
GPS
Networking Applications
Videoconferencing: Use of
computers, video cameras,
microphones, and networking
technologies to conduct face to
face meetings over a network.
Networking Applications
–Online conferencing
Monitoring systems: Monitor the (via the Internet)
status or location of individuals, –Telepresence
vehicles, assets, etc. videoconferencing
–RFID-based systems Collaborative computing
(workgroup computing)
Monitor the status of objects Telecommuting
–GPS-based monitoring systems
Monitor the physical location of
objects Networking Applications
–Electronic medical monitors and Telemedicine: Use of networking
other types of home health monitoring technology to provide medical
information and services
–Sensor networks
–Remote monitoring and
consultations
–Remote diagnosis
Monitoring Systems
–Telesurgery
Robot-assisted –Mesh networks: A network in which
May be needed for space there are multiple connections
exploration between the devices on the network
so that messages can take any one of
several paths
–Some networks use a combination of
Network Characteristics topologies
Wired vs. wireless networks
–Wired: A network in which computers
and other devices are connected to Network Topologies
the network via physical cables
Found in homes, schools,
businesses, and government
facilities
–Wireless: A network in which
computers and other devices are
connected to the network without
physical cables; data is typically sent
via radio waves Network Architectures
Found in homes, schools, and Architecture: The way networks
businesses are designed to communicate
Wi-Fi hotspots found in Client-server networks
coffeehouses, businesses, airports,
–Client: Computer or another
hotels, and libraries
device on the network that requests
and utilizes network resources
–Server: Computer dedicated to
Network Topologies processing client requests
Topology: How the devices in the
network (called nodes) are
arranged
–Star networks: A network that uses a
host device connected directly to
several other devices
–Bus networks: A network consisting
of a central cable to which all
network devices are attached
Network Architectures Virtual private network (VPN):
Secure path over the Internet that
Peer-to-peer (P2P) networks: All provides authorized users a secure
computers at the same level means of accessing a private
network via the Internet
–Internet P2P computing: Performed
via the Internet
Data Transmission
Characteristics
Bandwidth: The amount of data
that can be transferred in a given
period of time
–Measured in bits per second (bps)
Analog vs. digital signals (waves
vs. discrete)
Network Size and Coverage Area Serial vs. parallel transmission
Personal area network (PAN): –Serial = 1 bit
Connects an individual’s personal –Parallel = at least 1 byte at a time
devices that are located close
together.
Local area network (LAN):
Connects devices located in a
Data Transmission
small geographic area
Metropolitan area network (MAN):
Characteristics
Serves a metropolitan area
Transmission timing
Wide area network (WAN)
–Synchronous transmission (at
–Large geographic area
regular, specified intervals)
–Asynchronous transmission (sent
when ready)
Network Size and Coverage Area
–Isochronous transmission (sent at
the same time as other, related, data)
Intranet: Private network set up by
an organization for use by its
employees
Extranet: Intranet that is at least
partially accessible to authorized Transmission Timing
outsiders
packets and travel along with the
network separately
Used to send data over the
Internet
–Broadcast: Data is sent out to all
other nodes on the network
Primarily used with LANs
Data Transmission
Characteristics Type of Connections
Transmission directions:
–Simplex transmission
Data travels in a single direction
only
–Half-duplex transmission
Data travels in either direction but
only one way at a time
–Full-duplex transmission
Data travels in both directions,
both ways at the same time
Data Transmission
Characteristics
Type of connections:
–Circuit-switched: Dedicated path
over a network is established and all
data follows that path
–Packet-switched: Messages are
separated into small units called