0% found this document useful (0 votes)
14 views

404_reading_material

The document outlines the principles and practices of network design and management, including network and system administration, service characteristics, and the goals of network management. It details procedures for maintaining network functionality, designing network topology, and the roles of network architects and managers. Additionally, it discusses network management tools, security measures, and the network development life cycle, emphasizing the importance of identifying requirements and risks in network security.

Uploaded by

FG na Terrorists
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

404_reading_material

The document outlines the principles and practices of network design and management, including network and system administration, service characteristics, and the goals of network management. It details procedures for maintaining network functionality, designing network topology, and the roles of network architects and managers. Additionally, it discusses network management tools, security measures, and the network development life cycle, emphasizing the importance of identifying requirements and risks in network security.

Uploaded by

FG na Terrorists
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

READING GUIDE

i. Network administration
The management of network infrastructure devices (routers and switches), the management
of PCs in a network

ii. System administration


The management of computers whether they are coupled by a network or not.

iii. Service characteristic


Service characteristics are individual network performance and functional parameters that
are used to describe the services.
Goal of Network Design and Management
To keep the network running properly, configuring and managing services that are provided
over the network.
Network management is divided into 5 by International Organization for Standardization
o Fault Management
o Configuration Management
o Security Management
o Performance Management
o Accounting Management

Network management procedures and services that keep the network running properly.
1. Monitoring the network capacity to ensure that all transmission requirements can be met.
2. Adding capacity to the network by increasing band width interconnecting additional modes,
or creating and interconnecting additional networks.
3. Training people to use the network effectively
4. Assisting IT professionals in organizational applications that will make good use of the net-
work’s capabilities.
5. Backing up the network software and data regularly to protect against the failure of network
or any of its components
6. Putting security procedures in place to make certain that only authorized users have access
to the network and ensuring that all security procedures are followed
7. Making sure the network personnel can respond quickly and effectively in the event of a
network operational or security failure.
8. Diagnosing and troubleshooting problems on the network and determining the best course of
action to take to solve them.

1
Steps involve in designing a large network project.
i.Step 1: Identifying Network Requirements
The network designer works closely with the customer to document the goals of
the project. The goals I this step are usually separated into two categories:
ü Business goals: Focus on how the network can make the business more success-
ful.
ü Technical requirements: Focus on how the technology is implemented within
the network
ii.Characterizing the Existing Network
Information about the current network and services is gathered and analyzed. It is
necessary to compare the functionality of the existing network with the defined
goals of the new project. The designer determines whether any existing equipment,
infrastructure, and protocols can be reused, and what new equipment and protocols
are needed to complete the design.
iii. Designing the Network Topology
A common strategy for network design is to take a top-down approach. In this
approach, the network applications and service requirements are identified, and
then the network is designed to support them. When the design is complete, a pro-
totype or proof-of-concept test is performed. This approach ensures that the new
design functions as expected before it is implemented.
Based on their predictability service requests are categorized into 3
o Best-effort service: means that there is no control over how the network will satisfy the
service request that there are no guarantees associated with this service.
o Guaranteed service: provides an assured level of bandwidth, with a firm end-to-end delay
bound and no queuing loss for conforming packets of a data flow.
o predictable services: can provide services of predictable communication to applications
makes the development of new ones like an expensive and risky

Components of network management system architecture.


i. A network manager
ii. A set of managed remote (from the network manager) devices
iii. The Management Information Bases (MIBs) at these devices, containing data
about the devices’ status and operation
iv. Remote agents that report MIB information and take action under the control of
the network manager

Responsibilities of a network architect.


i. Upgrading the hardware to allow new software to work
ii. Employing information security within the network structure through passwords or user per-
missions
iii. On-boarding new users and ensuring user accounts are functioning
iv. Troubleshooting and fixing network issues
Types network Architecture
2
Centralized Architecture
o The Network Management Platform resides on a single computer system
o Single management station
o For full redundancy, the computer system is backed up by another system
o Can allow access and forward events to other consoles on network

Hierarchical Architecture
o Uses multiple computer systems
o One system acting as the central server
o Other systems working as clients

Components of SNMP
o SNMP Manager
o Managed device
o SNMP Agent
o Management Information Base (MIB)

Functions of SNMP in managing a network.


It is a network protocol used for collecting organizing and exchanging information between network
devices. SNMP is widely used in network management for configuring network devices like
switches, hubs, routers, printers, servers.
How SNMP can be used to watch over and configure network Devices.
It operates on the application layer. It defines communication between devices in a network.
It has three components, SNMP manger, SNMP agent and Management Information Base.
The SNMP manger monitors traffic seen by the agents and provides a mechanism for the control of
the agents. The SNMP agent is a software that exists within a network component. It contains real
time information about a network element, and it sends this information to an SNMP manager. MIB
is a virtual information storage location where network management information is held. This in-
formation can be altered by SNMP manger or agent
Network management tools.
o SNMP command tools
o MIB Walk
o MIB Browser
o SNMPSNIFF

3
Network remote monitoring (RMON)
o A standard specification that facilitates the monitoring of network operational activities
through the use of remote devices known as monitors or probes.
o Assists network administrators (NA) with efficient network infrastructure control and man-
agement.
o Developed to address the issue of remote site and local area network (LAN) segment man-
agement from a centralized location.
o The RMON standard specifies a group of functions and statistics that may be exchanged
between RMON compatible network probes and console managers.
o RMON performs extensive network-fault detection and provides performance-tuning data to
NAs.
Important steps in Identifying Potential Risks to Network Security.
Asset Identification
• Needs to identify the individual components that make up the network
• need to create an asset inventory.
Vulnerability Assessment
• Assess the vulnerabilities of identified network components in term of their weak-
nesses in the technology, configuration, or security policy.
Threat Identification
• Potential threats to the network need to be identified, and the related vulnerabilities
need to be addressed to minimize the risk of the threat.

Restrictive access
• More difficult to implement due to many security measures are implemented in this
• design.
• This model assumes that the protected assets are substantial, some users are not trustwor-
thy and that threats are likely.
• LANs that are connected to the Internet or public WANs are more likely to implement
this type of model.
• Ease of use for user diminishes as security tightens

Closed access
• Most difficult to implement because all available security measures are implemented in
this design
• unpopular model.
• This model assumes that the protected assets are premium, all user are not trustworthy
and that threats are frequent.
• User access is difficult and cumbersome.
• In the event of a security breach or network outage, network administrators might be held
more accountable for problems

4
COSC 404 PAST QUESTION
What is network design and management?
Network design and management is a branch of engineering that concerns the operational management of human
computer systems.
Mention the management procedures and services that keep the network running properly.
1. Monitoring the network capacity.
2. Adding capacity to the network by increasing band width interconnecting additional modes, or creating and
interconnecting additional networks.
3. Training people to use the network effectively
4. Assisting IT professionals in organizational applications.
5. Backing up the network software and data regularly to protect against the failure of network or any of its com-
ponents
6. Putting security procedures in place to make certain that only authorized users have access to the network and
ensuring that all security procedures are followed
7. Making sure the network personnel can respond quickly and effectively in the event of a network operational or
security failure.
8. Diagnosing and troubleshooting problems on the network and determining the best course of action to take to
solve them.
What are performance requirements that can be combined to describe a performance range for the system?
Network throughput, user response times, and line utilization
List the 3 types of network design
1. Bus topology 2. Star topology 3. Mesh topology
Define a system
A system is a set of components that work together to provide connectivity, services and communications to users.
Mention the components of a system
• Users, hosts (PCs, laptops, handhelds).
• Devices: routers & switches.
• Links (wired, wireless).
• Protocols (IP, TCP, FTP, SNMP).
• Applications (E-mail, Remote login (Telnet), P2P file sharing,
State any 5 service descriptions for IP networks
• IP networks : communication protocol.
• Responsible for addressing hosts(source to destination).
• Version: (IPv4) – decimal (192.168.2.253)
• subnet mask: 255 255 255 0(class D)
• IP ranges: Class A, Class B, Class C, Class D.
Discuss the system design attributes
Reliability: to perform its required functions under stated conditions for a specified period of time.(work simulta-
neously)
Maintainability: is used to maintenance the system such as, repair or replace faulty, prevent unexpected break-
downs.
Availability: to describe the amount of period that the system resources is available
Explain the following components of SNMP
Managed devices: are the network devices or systems that are monitored and managed using SNMP (Simple Net-
work Management Protocol). These devices could include routers, switches, servers, printers, and any other net-
work-connected equipment that supports SNMP.
Management information base (MIB): is a database that stores the collection of managed objects accessible via
SNMP.
SNMP manager: is a network management system (NMS) or software application responsible for monitoring and
controlling managed devices using SNMP.

5
State the key functions of SNMP agent
1. Monitoring and Collecting Data
2. Responding to SNMP Queries
3. Trapping and Sending Notifications
4. Managing Device Configuration
5. Maintaining Security
6. Performing Self-Monitoring:
Explain the network development life cycle (CISCO)
The network development life cycle (NDLC) is a Cisco methodology that provides a structured approach for de-
signing, implementing, and maintaining network infrastructure. It consists of six phases, namely Prepare, Plan, De-
sign, Implement, Operate, and Optimize.
1. Prepare: In this phase, the organization identifies the reasons for network development or upgrade. It involves
assessing business objectives, existing network infrastructure, and determining the scope of the project.
2. Plan: the planning phase involves creating a detailed project plan that outlines the network design requirements,
budget, timeline, and resources needed. The organization also considers any potential risks and develops a mitigation
strategy.
3. Design: the design phase, the network architect translates the requirements gathered in the planning phase into a
detailed network design. This includes selecting appropriate technologies, defining network topology, addressing
scheme, and security measures.
4. Implement: the implementation phase involves deploying and configuring network devices based on the design
specifications. This includes setting up routers, switches, firewalls, and other network components. Testing and
validation of the network are also performed to ensure proper functionality.
5. Operate: once the network is implemented, it enters the operational phase. In this phase, network administrators
monitor and manage the network infrastructure on a day-to-day basis. They are responsible for troubleshooting
issues, applying updates, and maintaining network security.
6. Optimize: the optimization phase focuses on continuously improving the network's performance and efficiency.
This includes monitoring network performance, identifying areas for improvement, and implementing necessary
changes to enhance network performance and address any emerging issues.
Define network topology
The topology of a network is the geometric representation of the relationship of all the links and linking devices
(usually called nodes) to one another.
Explain the two main principles of network design that enables it to work well.
Hierarchy – how much network traffic flows connect in tiers of organization
Interconnectivity – offsets hierarchy by allowing connections between levels of the design, often to improve per-
formance between them.
System administration is not just about installing operating systems. It is also including planning and design-
ing an efficient community of computers so that real users will be able to get their jobs done. State challenges
of network design and management.
• Designing a network which is logical and efficient.
• Deploying large numbers of machines which can be easily upgraded later.
• Deciding what services are needed.
• Planning and implementing adequate security.
• Providing a comfortable environment for users.
• Developing ways of fixing errors and problems which occur.
• Keeping track of and understanding how to use the enormous amount of knowledge which increases every year.

6
List the 3 types of network design
• Local Area Network (LAN)
• Wide Area Network (WAN)
• Metropolitan Area Network (MAN)
State the five (5) goals of network remote monitoring (RMON)
1. Fault Detection and Troubleshooting
2. Performance Monitoring
3. Traffic Analysis and Optimization
4. Capacity Planning and Resource Management
5. Security Monitoring and Compliance
What is the usefulness of RMON in a network?
Network Remote Monitoring (RMON) offers several key advantages for network management, making it a valuable
tool for administrators to ensure a stable, efficient, and secure network environment
How does network designers identify network requirements of a customer? What are the goals of identifying
the requirements?
Network designers identify network requirements of a customer through a systematic process that involves under-
standing the organization's objectives, current infrastructure, business processes, and user needs.
Here's how network designers typically identify network requirements:
1. Initial discussions and documentation
2. Analyzing technical details
3. Considering future requirements
Goals of Identifying Network Requirements:
1. Align design with business needs
2. Optimize performance and cost-effectiveness
3. Mitigate risks and future problems
4. Achieve user satisfaction
5. Set clear project expectations

What is the major difference between the SNMP version 1 and version 2?
The major differences between SNMPv1 and SNMPv2 include improvements in protocol operations, enhanced se-
curity features, increased protocol complexity, and compatibility considerations.

Write short note on the following:


Network administration: means the management of network infrastructure devices (routers and switches), the
management of PCs in a network.
System administration: is the term used traditionally by mainframe and Unix engineers to describe the manage-
ment of computers whether they are coupled by a network or not.
Service characteristics: are individual network performance and functional parameters that are used to describe
services.

Highlight the key products of a network design


1. Network Devices:
Routers: Responsible for routing data packets between different networks, directing them towards their final
destination.
Switches: Connect devices within a single network segment, enabling communication between them and for-
warding data to the appropriate device.
2. Cabling and Connectivity:
Cabling: Physical medium used to connect network devices, such as copper wires (twisted-pair, coaxial) or fiber
optic cables.
7
Connectors: Used to terminate cables and connect them to devices, such as RJ-45 connectors for Ethernet ca-
bles.
3. Software and Protocols:
Network Operating Systems (NOS): Software that manages resources and communication on network devices,
like routers and switches.
Management software: Provides tools for network administrators to monitor, configure, and troubleshoot the
network.
Networking protocols: Defined rules and standards for communication within the network,
4. Security Solutions:
Intrusion Detection/Prevention Systems (IDS/IPS): Monitor network traffic for malicious activity and can
take actions to block or mitigate threats.
Anti-virus and anti-malware software: Protects devices on the network from malware threats like viruses,
worms, and ransomware.

8
ASSIGNMENT

QUESTION: Discuss the key components that the architecture of network management systems
revolves around.

ANSWER:
Components of network management system architecture.
The architecture of network-management systems revolve around five key components:
i. A network manager
ii. A set of managed remote (from the network manager) devices
iii. The Management Information Bases (MIBs) at these devices, containing data
about the devices’ status and operation
iv. Remote agents that report MIB information and take action under the control of
the network manager
v. A protocol for communicating between the network manager and the remote
devices.

1. Network Manager: This is the person responsible for overseeing the network. Their job includes keeping the
network up and running, responding to issues, and ensuring smooth operation.
2. Managed Remote Devices: These are the various network components (such as routers, switches, servers, and
other devices) that make up the network. The network manager monitors and manages these devices.
3. Management Information Bases (MIBs): MIBs are databases that store information about network devices.
They provide a structured way to organize data related to network elements.
4. Remote Agents: These agents reside on the managed devices. They collect information from the MIBs and
report it to the network manager. Additionally, they can take actions based on instructions from the network
manager.
5. Communication Protocol: A protocol (such as SNMP - Simple Network Management Protocol) fa-cilitates
communication between the network manager and the remote agents. It allows the manager to retrieve infor-
mation, configure devices, and issue commands.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy