Topic 1 2 - NETWORK ADMINISTRATION

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

TOPIC 1 2.

Wide Area Network (WAN):

INTRODUCTION TO NETWORK WANS cover larger geographical areas, often


ADMINISTRATION spanning cities, regions, or even countries.

Overview of Computer Network The internet itself is a massive global WAN.


WANs use various technologies, including leased
• A computer network is a collection of
lines, satellites, and public networks.
interconnected computers and devices
that can communicate and share
resources with each other.
3. Metropolitan Area Network (MAN):
COMPONENTS OF COMPUTER NETWORKS
MANS have an intermediate scope, covering a
Nodes: Nodes are the individual devices or city or metropolitan area. They connect
computers connected to the network. These multiple LANS within the same city.
can include desktops, laptops, servers, routers,
switches, smartphones, and IoT devices.
4. Wireless Networks:
Links: also known as communication channels
or connections, are the physical or logical Wireless networks use radio waves or other
pathways that allow data to flow between wireless technologies to connect devices
nodes. These can be wired (e.g. ethernet without physical cables.
cables) or wireless (e.g., WIFI)
Examples include Wi-Fi, cellular networks, and
Network Interface Cards (NICs): NICs are satellite communication
hardware components that enable devices to
connect to the network. They provide a
physical or wireless interface for data NETWORK TOPOLOGIES
transmission.
• Bus Topology: All devices are connected to
Switches and Routers: Switches are used to a single central cable. Data travels in both
connect multiple devices within a local area directions along the cable.
network (LAN), while routers connect different
networks, such as LANs to the internet.
Routers also facilitate data routing between
networks.

Protocols: New protocols are rules and


conventions that govern how data is
formatted, transmitted, received, and processed
on a network. Examples include TCP/IP, HTTP, • Star Topology: All devices are connected to
and ethernet. a central hub or switch. Data flows through
the hub or switch to reach other devices.

TYPES OF COMPUTER NETWORKS

1. Local Area Network (LAN):

LANS are typically confined to a single


geographical location, such as a home, office,
or campus.

They use high-speed connections and are


commonly used for resource sharing and
internal communication.
Ring Topology: Devices are connected in a • TCP/IP is a suite of protocols that
closed-loop or ring. Data travels in one underlies the internet and most local
direction around the ring. area networks (LANs). It includes:
• TCP (Transmission Control Protocol):
Ensures reliable and ordered delivery of
data between devices.
• IP (Internet Protocol): Handles
addressing and routing of data packets
between devices on a network.
• UDP (User Datagram Protocol):
• Mesh Topology: Every device is connected Provides a connectionless, lightweight
to every other device. This offers redundancy transport protocol suitable for
and fault tolerance. applications that prioritize speed over
reliability.

Hypertext Transfer Protocol (HTTP) and


HTTP Secure (HTTPS)

HTTP is the protocol used for transmitting


web pages and data between web servers and
web browsers.

COMMON NETWORK SERVICES • HTTPS is the secure version of HTTP


that uses encryption to protect data
File Sharing: Networks enable the sharing of transmission.
files and resources among connected devices.
File Transfer Protocol (FTP)
Video Conferencing: Networks support real-
time audio and video communication over long • FTP is a protocol for transferring files
distances. over a network, often used for
uploading and downloading files to and
Cloud Computing: Cloud services are delivered from a web server.
over networks, allowing users to access and
store data and applications remotely Simple Mail Transfer Protocol (SMTP) and
Post Office Protocol (POP)/Internet
Email: Email services rely on networks to send Message Access Protocol (IMAP):
and receive messages across the internet.
• SMTP is used for sending email
Remote Access: Networks enable remote messages between email clients and
access to computers and systems, facilitating email servers.
remote work and administration. • POP and IMAP are used by email
Web Browsing: The World Wide Web relies on clients to retrieve messages from email
networks for users to access websites and servers. IMAP allows for email storage
web- based services. and management on the server, while
POP typically downloads messages to
Security and Firewall Services: Network the client.
security services protect data from
unauthorized access and cyber threats. Internet Control Message Protocol (ICMP):

• ICMP is used for diagnostic and error-


reporting purposes in IP networks. It
NETWORK PROTOCOLS AND STANDARDS includes functions like ping and
traceroute.
• Transmission Control Protocol (TCP) and
Internet Protocol (IP)
Domain Name System (DNS): networks to ensure they operate efficiently,
securely, and reliably.
• DNS translates human-readable domain
names (e.g., www.cvsu.edu.ph) into IP • Network administrators are responsible for
addresses (e.g.. 192.168.1.1), enabling designing, configuring, monitoring, and
users to access websites using domain troubleshooting networks, allowing
names. organizations to communicate, share resources,
and access the internet effectively.
Ethernet:

• Ethernet is a set of LAN protocols and


standards used for wired local area RESPONSIBILITIES OF NETWORK
networks. It defines the physical and ADMINISTRATORS
data link layers of network
- Network Design: Network administrators
communication.
plan and design network infrastructures to
IEEE 802.11 (Wi-Fi): meet the organization's requirements. They
decide on the network's layout, topology, and
• The IEEE 802.11 standard defines
the choice of hardware and software
wireless networking protocols, commonly
components.
known as Wi-Fi, for wireless local area
networks (WLANs). - Configuration: They set up and configure
network devices, such as routers, switches,
Border Gateway Protocol (BGP):
firewalls, and servers. Configuration includes
• BGP is used in the internet to defining IP addresses, subnets, DNS settings,
determine the best path for routing and security policies.
data between autonomous systems
- Maintenance and Upkeep: Network
(ASes). It's a critical protocol for
administrators perform routine maintenance
internet routing.
tasks, including software updates, security
Virtual Private Network (VPN) Protocols: patches, and hardware maintenance to ensure
network reliability and performance.
• VPN protocols like OpenVPN, IPsec, and
PPTP facilitate secure and encrypted - Monitoring: They continuously monitor
communication over public networks, network performance and troubleshoot issues
enabling remote access and site-to- as they arise. This includes analyzing network
site connections. traffic, identifying bottlenecks, and addressing
network outages.
Voice over Internet Protocol (VoIP)
Protocols: - Security: Network administrators implement
security measures to protect the network from
• Protocols such as SIP (Session Initiation threats such as malware, viruses, unauthorized
Protocol) and RTP (Real-time access, and data breaches. This involves
Transport Protocol) are used for configuring firewalls, intrusion detection
transmitting voice and multimedia over systems, and access controls.
IP networks.
- User Management: They manage user
IEEE 802.3af (Power over Ethernet - PoE): accounts, permissions, and access rights,
• PoE is a standard that allows Ethernet ensuring that users have the appropriate level
cables to deliver both data and of access to network resources while
electrical power to networked devices maintaining security.
like IP cameras and VoIP phones. - Backup and Recovery: Network
NETWORK ADMINISTRATION administrators establish backup and disaster
recovery plans to safeguard critical data and
Network administration involves the restore network functionality in case of
management and maintenance of computer failures or disasters.
- Documentation: Keeping accurate records multiple devices on a local network to
and documentation of network configurations, share a single public IP address.
changes, and troubleshooting procedures is
Router
essential for effective network administration.
• A router is used to route data packets
- Troubleshooting: Network administrators
between two different networks.
diagnose and resolve network issues promptly,
minimizing downtime and disruptions to the • It reads the information in each packet to
organization. tell where it is going.

• Layer 3 device used to route packets


between networks based on their IP
TOPIC 2 – NETWORK DEVICE
address
NETWORK DEVICE
• If the packet is addressed for an immediate
• Network devices are hardware components or
network, it has access to, it will strip the
software applications that enable the
outer packet (IP packet for example), re-
communication and data transfer between
address the packet to the proper Ethernet
different devices and systems in a computer
address, and transmit it on that network.
network.
If the packet is addressed for another network
• These devices play various roles in managing,
and must be sent to another router, it will
directing, and securing data as it travels
re-package the outer packet to be received
across a network.
by the next router and send it to the next
Functions of network devices router.

• Enable efficient and secure network


connectivity
SWITCH
• Facilitate data transmission and
communication between devices • • A network switch is used to connect devices
Enhance network performance and within a local network.
optimize traffic flow
• Provide network security by enforcing • It operates at the data link layer (Layer 2)
access control and threat prevention of the OSI model and makes decisions about
• Simplify network management and how to forward data frames to their
configuration destination based on MAC addresses.
• Extend network coverage and overcome Functions:
signal limitations
• Packet Switching: Switches forward
Router data frames to the appropriate
• A router is a key network device that destination device on a local network.
connects different networks together, such as • MAC Address Learning: They learn and
your local area network (LAN) to the internet. maintain MAC address tables for
It forwards data packets between these efficient packet forwarding.
networks and makes decisions based on IP • VLAN Support: Many switches support
addresses and routing tables. Virtual LANS (VLANs) to segment and
Functions: isolate network traffic.

• Routing: Routers determine the best Types of Switches


path for data packets to travel 1. Modular switches
between different networks.
• Network Address Translation (NAT):
Routers often perform NAT to allow
o let you add expansion modules 3. UNMANAGED SWITCH
as needed, giving you flexibility - a basic network switch that operates
as network requirements change. without the need for manual
o Expansion modules are configuration or management.
application-specific and include - often referred to as a "plug-and-play"
those for firewalls, wireless switch because it requires minimal setup
connectivity, or network analysis.
Limited Functionality: Unmanaged switches
o They may also allow for
lack advanced features such as VLAN
additional interfaces, power
support, Quality of Service (QoS) settings,
supplies, or cooling fans.
or traffic monitoring. They primarily focus
o This type of switch provides you
on data forwarding.
with the most flexibility, but at
a higher cost. - suitable for small home networks or
2. Fixed switches small office networks where simplicity
o a type of network switch with a and ease of use are more important
predetermined number of ports than advanced networking features.
that are not modular or
expandable.
o Unlike modular switches, where 4. Managed Switch
you can add or replace interface • a network switch that offers advanced
modules to change the number features and capabilities for network
and types of ports, fixed management and control.
switches have a fixed • Managed switches support VLANs, which
configuration that cannot be enable network segmentation and
altered. isolation and can improve security and
o These switches are designed for traffic management by separating
specific purposes and typically different parts of the network.
offer a set number of ports, • Has QoS features which allow
each with a designated purpose. administrators to prioritize specific
Common examples of fixed switches types of network traffic, ensuring that
critical data, such as VoIP or video
• Desktop Switches: Small unmanaged streaming, gets higher priority and
switches with a fixed number of ports, better performance.
typically used to expand the number of • the most expensive option of fixed-
network connections available at configuration switches and are most
individual workstations. common in organizations with large- or
• VoIP Switches: Fixed switches designed growing- networks.
specifically for voice over IP (VoIP) - Example: Cisco SG350-10 10- Port
phone systems, often providing PoE to Gigabit Managed Switch, SG35010K9NA
power the phones and voice traffic
prioritization. 5. Smart Switch
• Small Business Switches: Switches • an intermediate type of network switch
designed for small businesses with a that offers a limited set of managed
predetermined umber of ports, often features compared to full-featured
offering basic managed features. managed switches.
• The Network Switches: Consumer- • designed to be more user- friendly and
grade switches designed for home affordable than fully managed switches,
networks with a fixed number of ports making them suitable for small to
and limited management options. medium- sized businesses and even
advanced home networks.
- Example: NETGEAR 8-Port Gigabit
Ethernet Smart Switch (GS108T)
SWITCH FEATURES •Signal Distribution. Hubs simply broadcast
Switch speeds incoming data to all devices on a network
• For example, fixed-configuration segment without any intelligence or filtering.
switches can provide Fast Ethernet
NETWORK BRIDGE
(10/100 Mbps), Gigabit Ethernet
(10/100/1000 Mbps), Ten Gigabit • A bridge connects two or more network
(10/100/1000/10000 Mbps), and even segments and operates at the data link layer.
40/100 Gbps (gigabits per second)
speeds. • It can be used to filter or segment traffic
Number of ports within a network.
• Fixed-configuration switches are usually • Functions:
available with five, eight, 10, 16, 24, 28,
48, or 52 ports. • Segmentation: Bridges connect two or
more network segments, separating or
Power over Ethernet (PoE) vs. non- filtering traffic as necessary.
PoE
• MAC Address Filtering: They can filter
• PoE lets you power a device-such as traffic based on MAC addresses.
an IP phone, surveillance camera, or
wireless access point- over the cable GATEWAY
that is used for data traffic A gateway is a device or software that
• Switches with PoE are more expensive, connects two different networks using different
however. protocols.
• Example: NETGEAR 8-Port Gigabit
Ethernet Unmanaged POE Switch • It can perform protocol translation, data
(GS108LP) format conversion, and other tasks to enable
communication between networks.
Stackable vs Standalone Switch
• Functions:
• a standalone switch is managed and
configured as an individual entity with • Protocol Translation: Gateways
limited capacity. facilitate communication between
• If there is a problem, troubleshooting is networks that use different
also switch specific. communication protocols.
• stackable switches can be connected to • Data Format Conversion: They can
increase the capacity and availability of convert data formats to ensure
your network. compatibility between networks.
• Rather than configuring, managing, and
troubleshooting each switch, you can
treat the "stack" as a single unit
FIREWALLS
• This means that if any part of the
stack fails, the stack will route around • Firewalls are devices or software applications
the failure, so your network keeps that protect a network from unauthorized
running access, malware, and other threats.

HUB They filter incoming and outgoing network


traffic based on an organization's previously
• Hubs are older, less intelligent devices that
established security policies.
operate at the physical layer.
• Functions:
• They simply broadcast data to all devices in
a network segment, which can lead to • Security: Firewalls filter and control
inefficiencies and security issues and are incoming and outgoing network traffic based
already largely obsolete. on security rules to protect the network from
unauthorized access and threats.
• Function:
WIRELESS ACCESS POINT (WAP) MODEMS

• Access points are used to provide wireless •Modems (modulator-demodulator) convert


connectivity in a network. • They allow wireless digital data from a computer into the analog
devices to connect to a wired network, often signal required for transmission over a phone
via Wi-Fi. line or cable connection.

• It consists of a transceiver (transmitter and • They also convert incoming analog


receiver) device used to create a wireless LAN signals back into digital data for the
(WLAN). computer.

• Devices connected to AP form a network Functions:


called as WLANS also known as wireless
•Analog to Digital Conversion: Modems convert
local-area networks
digital data from computers into analog
• Each WAP is limited by its transmission range signals for transmission over phone lines or
- the distance a client can be from a WAP cable systems.
and still obtain a reasonable signal and data
•Digital to Analog Conversion: They also
process speed.
convert incoming analog signals back into
• Access points are used for as wireless range digital data for the computer.
extender extending and increasing the wireless
Main Types of Modems
coverage of an existing network and for
increasing the number of users that can • A DSL modem uses telephone cables
connect to it and is considered the slowest
connection.
WAP devices are widely used in the following
• A cable modem transmits information
environments:
over TV lines and is faster than DSL.
• Corporate • A wireless modem transfers information
between the local network and an
• Corporate organizations use a number of
internet service provider; it is the
WAP devices and attach them to a traditional
fastest transmitter.
wired network, in order to give wireless access
to the office LAN. REPEATERS

• Within the office setup, users have the • A repeater is an electronic device that
advantage of network access coupled with works at the physical layer of the OSI
mobility. model to amplify a received signal.
• It receives a signal and retransmits it
• Access point can handle over 60
at a higher level or higher power.
simultaneous connections each.
• As a result, the signal covers longer
Fat APs vs Thin APs distances, sometimes more than 100
meters for standard LAN cables.
•Fat APs, sometimes called autonomous FAPS,
must be manually configured with network and
security settings. They are left alone to serve
clients until they can no longer function.

• Thin APs allow remote configuration using a


controller. Since thin clients are not manually
configured, they can be easily reconfigured
and monitored.

You might also like