You are on page 1of 10

Network Administration

Chapter-I-IMPLEMENTATION OF NETWORK
1.1 Network Design Overview
Def: Computer network is a telecommunications network that connects a collection of computers to
allow communication and data exchange between systems, software applications, and users.
 Two devices are said to be networked when a process in one device is able to exchange
information with a process in another device
 Example: The best-known computer network is the Internet.

1.1.1 Reasoning the need:


Importance of computer networking.
 Provides best way of business communication.
 Streamline communication.
 Cost-effective resource sharing.
 Improving storage efficiency and volume.
 Cut costs on software.
 Cut costs on hardware.
 Utilizes Centralized Database.
 Increase in efficiency.
 Optimize convenience and flexibility.
 Allows File sharing.
 sharing of peripherals and internet access.
 Network gaming.
 Voice over IP (VoIP).
 Media Center Server.
 Centralize network administration, meaning less IT support.
 Flexibility.
 Allowing information sharing.
 Supporting distributed processing.
 User communication.
 Overcoming geographic separation.

Some of the more important pieces of information that can be gathered during a site survey include:
 Number of users and types of equipment
 Projected growth
 Current Internet connectivity (if any)
 Application requirements
 Existing network infrastructure and physical layout
 New services required
 Security and privacy considerations
 Reliability and Uptime expectations
 Budget constraints
There are many reasons why computer networks are used in modern society. Some of
the key reasons include:
1. Resource sharing: Networks enable multiple users to share resources such as
printers, data storage devices, and other hardware and software resources. This can
help to reduce costs, increase efficiency, and improve productivity.
2. Communication: Networks provide a way for individuals and groups to
communicate and collaborate with each other, whether through email, instant
messaging, video conferencing, or other means. This can be especially valuable for
businesses and organizations that have employees in different locations or who work
remotely.
3. Access to information: Networks provide access to information and data, which
can be essential for businesses and individuals who need to access information
quickly and efficiently. Networks also enable the sharing of information between
individuals and groups, which can help to facilitate collaboration and innovation.
4. Internet access: Networks provide access to the internet, which is essential for
businesses, organizations, and individuals who need to access online resources,
communicate with others around the world, and stay up-to-date with the latest news
and trends.
5. Security: Networks can be used to implement security measures such as
firewalls, encryption, and other technologies that can help to protect sensitive
information and prevent unauthorized access.
6. Remote Management: Networking allows administrators to remotely manage and
monitor devices and systems, making it easier to troubleshoot and resolve issues
without having to be physically present.
7. Cloud Computing: Networking is essential for cloud computing, allowing users
to access and use cloud-based services and applications from anywhere in the world.
8. Competitive Advantage: Networking can provide a competitive advantage by
enabling businesses and organizations to collaborate more effectively, improve
productivity, and enhance customer service.

1.1.2 Seeking approval:

Analysis and Design Phases b) Implementation Phases


• Request • Purchasing and vendor agreement
• Feasibility Study • Installation
• Analysis (requirement) • Training, and testing
• Alternatives (cost and benefit) • Conversion
• Design • Follow up audit
• Selection
• Cost
• Documentation
• Management approval:
Review and verification
1.Users
2.Operators
Management: budget

1.2 Designing a home or small office network

Type of network for your business will depend on your needs but the
components of your computer network will remain the same.

Here is the list of devices needed to set up a computer network for your
business:

 Modem
 Router
 Firewall
 Switch
 LAN Cable / Patch Cable
 Access Point
 Repeater
 Patch Panel

1.2.1 Selecting computers:

NUMBER OF DEVICES ON YOUR NETWORK


 Desktops
 Laptops
 Tablets
 Smartphones
 Network Printers
 VoIP phone system
 Conference room equipment
 POS systems
 IP Cameras
 Guest Devices

1.2.2 Selecting a networking protocol


A network protocol is a set of rules, conventions or data structures that allows communication between
devices in a network. They are essential for allowing two or more devices to identify and connect with
each other. The protocols also specify how the devices communicate within the network package, send,
receive and interpret data. Another way to think of a network protocol is as a language that devices use to
share information with each other, regardless of any differences in their designs or hardware.
In general, network protocols perform three primary actions:
1. Communication
2. Security
3. Network management
1. Network communication protocols
A network communication protocol allows basic data transfers between network devices. These protocols
can communicate text-based files among computers or over the internet, and they can establish
communication between routers and external or linked devices in a network.
Examples of network communication protocols include:
Bluetooth: A Bluetooth protocol can connect devices with different functions like laptops, mobile
phones, cameras, printers and tablets.
File transfer protocol (FTP): FTP protocols allow devices to share files between hosts. They enable
devices to share large files, resume sharing after an interruption, recover lost files and schedule file
transfers.
Transmission control protocol/internet protocol (TCP/IP): This protocol provides reliable delivery to
applications and ensures that the message arrives at the correct location, on time and without duplication.
Hypertext transfer protocol (HTTP): A protocol used for distributed and collaborative hypermedia
information systems that allow for sharing data like text files, images and videos over the internet.
Simple mail transfer protocol (SMTP): The SMTP transfers emails between devices and notifies the
user of incoming electronic messages.

2. Network security protocols


These protocols ensure that data transmitted over a network remains secure. They prevent unauthorized
users from accessing information by incorporating passwords, authentication systems or data encryption.
Hypertext transfer protocol secure (HTTPS): This protocol works similarly to HTTP but uses
encryption to ensure the secure communication of data over a network like the internet.
Secure sockets layer/transport layer security (SSL/TLS): SSL and TLS protocols also use encryption
to secure information transferred between two systems in a network. TLS is the most recent version of
this protocol, though some companies or individuals may still use the term "SSL" to refer to this type of
protocol.
Secured shell (SSH): The SSH protocol provides secure connections to a network and is the primary
method of managing network devices at the command level, which is the level at which the user can
control a computer's operating system.
Secure file transfer protocol (SFTP): An SFTP allows for secure file access, transfer and management
over a network.
3.Network management protocols
Network management protocols define the procedures used to operate a network. This includes how
networks function and their maintenance requirements.
Simple network management protocol (SNMP): An SNMP allows network administrators to evaluate a
network's performance, identify network errors and troubleshoot problems.
Internet control message protocol (ICMP): This protocol can send error messages and information
about a device or network's operations. They can announce an error and also assist with troubleshooting
tasks.
Telnet: Telnet works similarly to SSH. It's a method of managing devices at the command level, but
unlike SSH, it doesn't provide a secure connection to a network.
- Choosing a network medium:
The criteria for choosing network media are:
1. the distance the media can successfully carry a signal
2. the environment in which the media is to be installed
3. the amount of data and the speed at which it must be transmitted
4. the cost of the media and installation.
- Choosing a network speed:
1.2.3 Expanding the network
The longer a network is in place and functioning properly, the more your organization might want to
expand its features and services.
Initially, you can increase network population by adding new hosts and expanding network services by
providing additional shared software. But eventually, a single network will expand to the point where it
can no longer operate efficiently.
Several options are available for expanding your network:

1. Setting up a new network and connecting it to the existing network using a machine functioning
as a router, thus creating an internetwork
2. Configuring machines in users' homes or in remote office sites and enabling these machines to
connect over telephone lines to your network
3. Connecting your network to the Internet, thus enabling users on your network to retrieve
information from other systems throughout the world
4. Configuring UUCP communications, enabling users to exchange files and electronic mail with
remote machines

1.3 Remote Network Access


1.3.1 Public Switched Telephone Network (PSTN):
The public switched telephone network is a traditional circuit-switched telephone network. It has been
around for a very long time, even before the commercialization of the telephone network around 1874.
It consists of the complex interconnection of switching centers and end-users that offers a voice
connection between any two valid subscribers.
A successful connection to the public switched telephone network needs an operator and a pair of wires,
typically overhead. It also needs a telephone exchange.

1.3.2 Integrated Services Digital Network (ISDN):


The integrated services digital network provides end-to-end digital connectivity to support a wide range
of services, including voice and non-voice services.
When compared to the PSTN, it provides faster data transfer rates and higher call quality.
ISDN also supports multiple simultaneous connections, allowing numerous users to use the same line at
the same time. ISDN is therefore suitable for businesses that demand high-speed data transfer and reliable
voice communication.

Characteristics ISDN PSTN


Transmission protocol Digital Analog
Data transfer rates Up to 128 Kbps Up to 56 Kbps
Simultaneous connections Multiple One
Cost High Low
It is appropriate for It is suitable for residential
businesses that require users and provides basic
Suitable for
high-speed data transfer. voice communication
services.

1.3.3 Digital Subscriber Line (DSL):


Digital subscriber line (DSL) is a technology that transports high-bandwidth data over a simple telephone
line that is directly connected to a modem. This allows for file-sharing, and the transmission of pictures
and graphics, multimedia data, audio and video conferencing and much more.
DSL uses modems that utilize existing phone lines to transmit high-bandwidth content, like multimedia or
video, to customers. It delivers dedicated, point-to-point network connections to the public. This
connection often exists between the central office of a network service provider (NSP) and the client
location or on local loops constructed inside buildings or campuses.
With a DSL link, you may concurrently utilize the internet and your phone line. This is mainly used in
homes and small companies that simultaneously need access to the internet and phone lines.
The two most common types of DSL are:
 Asymmetric DSL (ADSL): ADSL is less expensive and more prevalent because of its quicker
download speed as opposed to upload speed.
 Symmetric (SDSL): SDSL is preferred by professionals who need to back up large amounts of
information to cloud storage or virtual private network (VPN) users due to its equivalent
download and upload speeds.

You might also like