Professional Documents
Culture Documents
NETWORK MANAGEMENT
BIT 3204
BBIT/111/05470
(i) Why is it important to do site survey when planning for a network upgrade (2
marks)
i. The main purpose of a site survey is to understand the nature of the business
premises in terms of how the building, office space and electrical wiring are
set up.
ii. It helps answer whether or not the type of network requested can be supported
iii. It also helps estimate how much material will be required to layout the
network.
(ii) Describe any three areas you would look at when conducting a site survey(6
marks)
sensitive operations.
ii. Budget -the cost should always be factored in. How much will the equipment
iii. Total users -the number of users directly impacts network capacity. Network
desirable.
iv. Security -hackers gain access to systems primarily through networks. The
security aspect is a must when setting up site surveys. Both physical and
(b) Discuss the four fundamental design goals that are considered by a network
Network connectivity today means more than Ethernet cables and wireless access
points. People today are more connected while mobile than ever before and many
of them want access to company email and data while they are out of the office.
components in the network. Even small organizations should consider using two
servers. Two identical servers, for example, can be configured with fail-safes so
that one will take over if the other fails or requires maintenance. A good rule of
thumb is to have redundant components and services in place for any part of a
ensuring the network runs smoothly. It also reduces costs associated with
maintenance, updates and repairs. Conducting a full audit of the current computer
systems, software and peripherals will help to determine which should be
standardized.
A detailed disaster recovery plan should be a part of any network design. This
includes, but is not limited to, provisions for back-up power and what procedures
should be followed if the network or server crashes. It should also include when
data is backed up, how it is backed up and where copies of the data are stored. A
(c) Explain any three tools or applications used in securing a computer network(6
Marks)
i. The Metasploit Framework: This is a free and open source network penetration
testing framework. Network security experts worth their salt should have this tool
as one of the minimum requirements (Kizza, 2012). It can be used both for testing
and breaking into systems making it also one the favourite hacker tools.
ii. Nmap: Nmap is a popular open source port scanner. This network tool has many
functionalities such as mapping out of networks and host fingerprinting. This tool
comes with a scripting engine that can aid in determining network vulnerabilities.
iii. Wireshark: this is mainly a network traffic analysis tool. Wireshark applications
engineering, and network penetration testing. This tool can analyse networks in a
(4
Marks)
ii. Management and monitoring tools - a good network operating system should
come equipped out of the box with tools that can manage networks, analyse
iii. Security - The network operating system is at the heart of network operations.
iv. Price: some network operating systems some such as MicroTik or Windows NT
(e) With reference to the steps of network development distinguish between a logical
Physical Topology is the actual layout of a network and its connections. Logical Topology is
the way in which data accesses the medium and transmits packets.
REFERENCES