Loading...

NETWORK ADMINISTRATION  

>

LEARNING OUTCOME 1

SITE SURVEY

A network site survey is a crucial first step in designing, installing, or optimizing a computer network within a physical location. It's essentially an investigative process that gathers information about the environment where the network will be deployed. Think of it as scouting a location before building a house – you need to understand the terrain, resource availability, and potential challenges before laying the foundation.

What it is:

Example:

Imagine you're opening a new coffee shop. You wouldn't just order furniture and equipment without first measuring the space, right? A network site survey is similar. Before installing Wi-Fi access points (routers), cables, and other network components, you need to understand the layout and potential obstacles in your coffee shop.

CONDUCTING A SITE SURVEY (Step-by-Step):

1. Planning and Preparation:

2. Site Inspection:

3. Signal Strength Measurement:

4. Data Recording and Analysis:

5. Report Generation and Recommendations:

6. Review and Approval:

Additional Information:

ENVIRONMENTAL FACTORS AND NETWORK DESIGN

Network design isn't just about choosing the right equipment and software; it's heavily influenced by the environment where the network will reside. Here's a breakdown of how various environmental factors can impact network design:

Physical Obstructions:

Electromagnetic Interference (EMI):

Environmental Conditions:

Security Considerations:

Additional Factors:

GATHERING USER REQUIREMENTS

Interviews:

Interviews are a cornerstone method for gathering user requirements in network administration. They provide a valuable opportunity to engage directly with users, understand their needs, and gain insights into their pain points and preferences related to the network.

Advantages of Interviews:

Types of Interviews:

Effective Interview Techniques:

Challenges of Interviews:

Mitigating Interview Challenges:

Questionnaire:

A questionnaire is a structured set of questions used to gather information from a large number of users in a standardized way.

Advantages:

Disadvantages:

Designing Effective Questionnaires:

Observation:

Observation involves directly observing user behavior and interactions with the network. This method provides valuable insights into actual user workflows and pain points related to network functionalities.

Advantages:

Disadvantages:

Effective Observation Techniques:

Published Documents:

Published documents can be a valuable yet often overlooked source of information for gathering user requirements in network administration. These documents can provide insights into user demographics, usage patterns, and emerging trends that can inform network design and optimization efforts.

Types of Published Documents:

Advantages:

Disadvantages:

SERVICE PROVIDERS

DSL Technology

Imagine a water pipe. It can carry a powerful torrent of water, but it can also be used to deliver a steady stream for household needs. DSL (Digital Subscriber Line) technology operates on a similar principle, utilizing existing telephone lines to transmit high-speed internet data.

How DSL Works:

Advantages:

Disadvantages:

Cable Broadband

Cable broadband is a popular technology for internet access that utilizes the same coaxial cables that deliver television signals to your home. Imagine a highway with multiple lanes – cable broadband leverages these lanes to transmit data at significantly faster speeds compared to traditional telephone line technologies like DSL.

How Cable Broadband Works:

Advantages

Disadvantages

Cable broadband offers a compelling combination of speed, affordability, and wide availability. For users who prioritize fast internet access for browsing, streaming, and online gaming, cable broadband is a strong contender. However, factors like shared bandwidth and lower upload speeds need to be considered when making a decision. As technology continues to evolve, cable broadband providers are constantly improving their infrastructure and service offerings to stay competitive in the ever-growing internet access landscape.

Dial-Up

Dial-up internet, though largely surpassed by faster technologies, is still a viable option in some areas and offers a glimpse into the not-so-distant past of web browsing. Imagine connecting to the internet by literally dialing a phone number – that's the essence of dial-up.

How Dial-Up Works:

Advantages of Dial-Up

Disadvantages

Public Switched Telephone Network (PSTN)

The Public Switched Telephone Network (PSTN), also known as the traditional landline network, has been the cornerstone of voice communication for over a century. It's the intricate web of wires and switching facilities that connects phone users worldwide, enabling them to communicate over long distances.

How the PSTN Works:

Advantages

Disadvantages of the PSTN:

Satellite

Satellite communication utilizes artificial satellites orbiting Earth to transmit and relay data signals. This technology bridges communication gaps in remote areas, across vast oceans, and even allows for global navigation and mobile phone connectivity. Imagine a network of powerful radio towers floating in space, facilitating communication across continents.

How Satellite Communication Works:

Advantages

Disadvantages

Satellite communication serves as a vital technology for bridging communication gaps across the globe. It offers unique advantages like global coverage, mobility, and disaster resilience, making it essential for various applications. However, factors like latency, weather dependence, and cost need to be considered when evaluating its suitability for specific needs. As satellite technology continues to evolve, with advancements in constellations and signal transmission techniques, we can expect satellite communication to play an even more prominent role in the future of global connectivity.

Wireless / Untethered Communication

Wireless communication has revolutionized the way we connect, offering us freedom from the constraints of wires and cables. Imagine a world where information flows freely through the air, allowing us to stay connected, informed, and entertained without physical tethers.

The Underlying Magic: Electromagnetic Waves

Wireless communication relies on electromagnetic waves to transmit information. These waves travel through the air at the speed of light, carrying encoded data from one device to another. Different frequencies of electromagnetic waves are used for various applications:

How Wireless Communication Works:

  1. Transmission: A wireless device (transmitter) converts digital data into an electromagnetic signal using a process called modulation. This modulated signal is then amplified and broadcasted through an antenna.
  2. Propagation: The electromagnetic signal travels through the air, potentially encountering obstacles or interference along the way.
  3. Reception: Another wireless device (receiver) with a compatible antenna picks up the electromagnetic signal.
  4. Demodulation: The receiver demodulates the signal, converting it back into its original digital data format.
  5. Connectivity: The recovered data is then processed by the receiving device, enabling communication, data transfer, or other desired actions.

Benefits of Wireless Communication:

Challenges of Wireless Communication:

The Future of Wireless:

Wireless technology is constantly evolving, with advancements in areas like:

INTERNET SERVICE PROVIDERS (ISPS) IN ZIMBABWE:

Major Players:

Other Notable ISPs:

Things to Consider When Choosing an ISP in Zimbabwe:

NETWORK BUDGET:

A network budget is a financial blueprint that outlines the expected costs associated with designing, implementing, operating, and maintaining your computer network infrastructure. Just like a household budget allocates funds for various expenses, a network budget helps ensure your network runs smoothly and efficiently by planning for the financial resources needed.

Types of Network Budgets:

There are three main categories to consider:

  1. Capital Expenditure (CapEx) Budget: This focuses on one-time, upfront costs required to establish a new network or upgrade existing infrastructure. Here are some real-life examples and their estimated costs:
    • Hardware: Network devices like routers, switches, firewalls, and wireless access points (cost can range from $50 for a basic switch to $10,000 for a high-performance router).
    • Software: Network operating systems, security software, and network management tools (licensing costs can vary depending on features and number of users).
    • Structured Cabling: The physical cables and connectors used to connect network devices (installation costs can vary depending on building size and complexity).
    • Servers: Physical servers or cloud-based server instances to run essential network applications (costs depend on processing power, storage capacity, and chosen cloud provider).
  2. Operational Expenditure (OpEx) Budget: This category deals with ongoing costs associated with keeping the network operational. Here are some examples:
    • Internet Service Provider (ISP) Fees: Monthly charges for internet access (costs depend on chosen plan and bandwidth requirements).
    • Software Subscriptions: Recurring fees for software licenses that need to be renewed periodically (e.g., security software subscriptions).
    • Maintenance and Support: Costs associated with maintaining network equipment, troubleshooting issues, and potential repairs (can be in-house staff salaries or outsourced service contracts).
    • Electricity: Power consumption of network devices adds to the operational costs.
  3. Network Expansion Budget: This budget anticipates future growth and scalability needs. Here are some potential expenses:
    • Additional Network Devices: As the number of users or devices on the network grows, additional switches, access points, or firewalls might be needed.
    • Software Upgrades: Network software licenses might need to be upgraded to accommodate more users or new features.
    • Bandwidth Expansion: As internet usage increases, upgrading to a higher bandwidth internet plan from your ISP might be necessary.

Key Considerations When Creating a Network Budget:

Network Device Specifications

Network devices are the building blocks of any computer network, working together to facilitate communication and data flow. Here's a breakdown of some common network devices with sample specifications to illustrate their key characteristics:

Device: Router

Device: Switch

Device: Firewall

Device: Wireless Access Point (WAP)

Additional Considerations:

NETWORK DIAGRAMS:

A network diagram is a graphical representation of a computer network, depicting the various devices (routers, switches, firewalls, etc.) and the connections between them. It's like a map that visually translates the complex web of your network infrastructure, making it easier to understand, troubleshoot, and plan for future growth.

Def2- A network topology diagram is a visual representation of your computer activity network. It’s a chart with a series of symbols and icons representing different elements of your network.

There are two types of network diagrams:

Whether you need a physical or logical diagram depends on what you’re trying to outline and your goals for doing so.

For example, if you’re looking for a way to improve the physical structure of your network, a physical diagram is the better option. If you need to streamline the flow of communication and information within your network, a logical diagram is the right choice.

Physical and Logical Network diagram

Uses of Network Diagrams:

Why Network Diagrams are Important:

Interpreting a Network Diagram:

Network diagrams utilize symbols to represent different network devices and utilize lines to depict connections between them. Here's a basic breakdown of common symbols and their meanings with pictures:

Network Diagram Componets

NETWORK HARDWARE AND SOFTWARE

The interpretation of a network diagram goes beyond just recognizing symbols. Here are some additional aspects to consider:

By understanding the common symbols, conventions, and potential additional details, you can effectively interpret a network diagram and gain valuable insights into the structure and functionality of a computer network.

Firewalls:

A firewall is a crucial security component in a computer network, acting as a gatekeeper that monitors and filters incoming and outgoing traffic. Imagine a security guard at a castle gate, meticulously checking everyone and everything that enters or leaves, ensuring only authorized traffic passes through.

How a Firewall Works:

Pros of Using a Firewall:

Cons of Using a Firewall:

Example:

Imagine you have a home network with multiple devices like computers, laptops, tablets, and smartphones connected to the internet via a router. The router itself might have a basic firewall built-in, but a dedicated firewall can offer more granular control and better security features.

The firewall would monitor all incoming and outgoing traffic on your network. For instance, it might allow you to browse websites freely while blocking access to known malicious websites or ports commonly used for hacking attempts. It can also restrict incoming traffic to your devices, preventing unauthorized programs from establishing connections and potentially stealing data.

Routers and Switches

Within a network, data flows like traffic on a highway. Routers and switches are two essential network devices that play vital roles in directing and managing this data flow, ensuring information reaches its intended destination.

The Router: The Traffic Director

Pros of Using a Router:

Cons of Using a Router:

The Switch: The Traffic Organizer Within a Network

Pros of Using a Switch:

Cons of Using a Switch:

Real-Life Example:

Imagine your home network with a router connected to your internet service provider and multiple devices like computers, laptops, and a gaming console connected to the router's ports.

Wireless Range Extender: Boosting Your Wi-Fi Signal

Pros of Using a Wireless Range Extender:

Cons of Using a Wireless Range Extender:

VoIP Endpoint: Making Calls Over the Internet

Pros of Using a VoIP Endpoint:

Cons of Using a VoIP Endpoint:

Real-Life Example:

Imagine you live in a house with a strong Wi-Fi signal in the living room where your main WAP is located. However, the signal weakens significantly in the bedrooms on the other side of the house. This creates a dead zone where you have weak or no Wi-Fi connectivity.

By installing a wireless range extender in a strategic location, like the hallway between the living room and bedrooms, you can amplify the Wi-Fi signal from your main WAP.

Multilayer Switch and Wireless LAN Controller

In simpler terms, a multilayer switch is like an advanced traffic cop within your network, understanding not just device addresses but also network destinations, allowing for more efficient data forwarding decisions. A wireless LAN controller, on the other hand, acts like a maestro for your wireless orchestra of access points, providing centralized management and ensuring all your WAPs work in harmony to deliver a seamless and secure wireless experience.

Load Balancers and Intrusion Detection/Prevention Systems (IDS/IPS)

Maintaining network performance and security requires a multi-layered approach. Here, we'll explore two essential tools that play vital roles in these areas: Load Balancers and Intrusion Detection/Prevention Systems (IDS/IPS).

Load Balancer: Distributing Traffic for Optimal Performance

Intrusion Detection/Prevention System (IDS/IPS): Safeguarding Your Network

Choosing the Right Tool:

Working Together:

Load balancers and IDS/IPS systems can work together to create a robust network security environment. The load balancer distributes traffic efficiently, while the IDS/IPS monitors each incoming request for potential threats before it reaches the servers.

Proxy Servers vs. VPN Concentrators

Both proxy servers and VPN concentrators play a role in managing network traffic, but they serve distinct purposes. Here's a breakdown to help you understand the differences:

Proxy Server: The Traffic Director for Specific Applications

VPN Concentrator: The Secure Tunnel for Your Entire Network

VoIP PBX

VoIP PBX, which stands for Voice over Internet Protocol Private Branch Exchange, plays a central role in modern business phone systems. It leverages internet technology (VoIP) to facilitate internal and external communication.

Functioning as the Heart of Your Business Phone System:

Imagine a central hub that manages all your business phone calls. That's essentially what a VoIP PBX does. It connects your office phones, mobile apps, and external phone lines over a Voice over Internet Protocol (VoIP) network.

  1. Internal Calls: When an employee makes a call within your office, the PBX routes the call directly to the intended recipient's extension.
  2. External Calls: For outbound calls to traditional landlines or mobile numbers, the PBX acts as an intermediary.
  3. Feature Management: The VoIP PBX serves as the brain of your business phone system, allowing you to configure various features.

Benefits of Utilizing a VoIP PBX:

The Internetwork Operating System

An internetwork operating system (IOS), sometimes referred to as a network operating system (NOS), acts as the central nervous system for interconnected computer networks. Imagine it as a conductor overseeing a complex orchestra of devices, ensuring smooth communication and resource sharing across your network.

Core Functions of an Internetwork Operating System:

Types of Internetwork Operating Systems:

Benefits of Utilizing an Internetwork Operating System:

Network Services:

Network services are the invisible forces that power our daily online activities. They operate behind the scenes, ensuring smooth communication and resource sharing across networks. Here, we'll delve into two essential network services: DNS (Domain Name System) and DHCP (Dynamic Host Configuration Protocol).

1. DNS: Translating Names to Numbers

Imagine trying to find your friend's house by just knowing their nickname. It would be a frustrating task! Similarly, computers communicate using numerical IP addresses, which are difficult for humans to remember. This is where DNS comes in, acting like the internet's phone book.

2. DHCP: Dynamic IP Assignment

Imagine having to manually assign a unique phone number to every phone call you make. DHCP eliminates this tedious task in the network world.

DNS and DHCP work together seamlessly to create a smooth and efficient network experience. DNS translates website names into IP addresses, while DHCP dynamically assigns IP addresses and configurations to devices, ensuring they can communicate on the network. These essential network services operate behind the scenes, but their contribution is undeniable, making our online interactions effortless.

Network Topologies: Wired vs. Wireless - Bus and Ring Architectures

Network topologies define the physical or logical layout of how devices are interconnected on a network. Here, we'll explore two common topologies used in both wired and wireless networks: Bus and Ring.

Understanding Wired and Wireless Networks:

Bus Topology: A Simple Shared Pathway

Imagine a single lane highway where all devices connect to a central cable. That's the essence of a bus topology, applicable in both wired and wireless networks.

Wired Bus Network:

Wireless Bus Network (Wi-Fi):

Pros of Bus Topology:

Cons of Bus Topology:

Ring Topology: A Circular Flow of Information

Imagine devices arranged in a closed loop, passing information from one to the next. This loop structure represents a ring topology, again used in both wired and wireless networks.

Wired Ring Network:

Wireless Ring Network (Token Ring):

Pros of Ring Topology:

Cons of Ring Topology:

Stars, Mesh, and Hybrid

Network topologies define the blueprint for how devices connect and communicate on a network. Here, we'll delve into three key topologies: Star, Mesh, and Hybrid, exploring their functionalities and use cases.

1. Star Topology: The Central Hub Approach

Imagine a central hub, like a star at the center of a constellation, with all devices connected to it individually. This is the essence of a star topology, a popular choice for wired networks.

Pros of Star Topology:

Cons of Star Topology:

2. Mesh Topology: The Interconnected Web

Imagine a web of interconnected devices, where each device can communicate with multiple devices directly. This interconnected structure represents a mesh topology, used in both wired and wireless networks.

Pros of Mesh Topology:

Cons of Mesh Topology:

3. Hybrid Topology: A Blend of Strengths

Imagine combining the best aspects of different worlds. That's the philosophy behind hybrid topologies. They merge elements from two or more basic topologies to create a network design that caters to specific needs.

Pros of Hybrid Topology:

Cons of Hybrid Topology:

Network Diagrams: A Visual Representation of Your Network

A network diagram is a graphical representation of a computer network. It visually depicts the layout and components of your network, including devices, connections, and how they interact. Imagine it as a blueprint that simplifies understanding the complex web of interconnected elements that make up your network.

Purpose of Network Diagrams:

Common Network Diagram Symbols:

Network Diagramming Software

Network diagramming software provides a valuable toolkit for creating professional and visually appealing network diagrams. These tools go beyond basic drawing programs by offering specialized features and libraries of network component symbols, streamlining the network diagramming process.

Benefits of Using Network Diagramming Software

Creating a Network Diagram with Software: A Step-by-Step Example (Using Lucidchart)

While specific steps might vary depending on the software you choose, here's a general walkthrough using Lucidchart, a popular network diagramming tool:

  1. Choose a Template (Optional): Lucidchart offers network diagramming templates to get you started quickly. You can choose a blank canvas if you prefer a custom design.
  2. Select Network Device Symbols: Drag and drop network device symbols (e.g., computer, router, switch) from the library onto your workspace. Lucidchart provides a vast library of pre-built symbols representing various network components.
  3. Connect Devices: Use the connector tool to establish connections between devices. You can choose different line styles (straight, curved) to represent different types of connections (wired, wireless).
  4. Label Devices and Connections (Optional): Add labels to devices and connections to provide additional information, such as device names, IP addresses, or connection types.
  5. Customize and Annotate (Optional): Lucidchart allows you to customize the appearance of your diagram by changing colors, adding shapes, or including text annotations for clarity.
  6. Export and Share: Once your diagram is complete, you can export it in various formats (e.g., PNG, PDF, JPG) for sharing with colleagues or documentation purposes.

Beyond Lucidchart: Other Network Diagramming Software Options

Lucidchart is just one example; there are several other network diagramming software options available, both free and paid. Here are a few popular choices:

Choosing the Right Network Diagramming Software

Consider your network complexity, budget, desired features, and collaboration needs when selecting a network diagramming software. Free options like Draw.io might suffice for simple networks, while paid options like Lucidchart or Visio offer more advanced features and collaboration capabilities for complex network layouts.

By leveraging network diagramming software, you can create clear, informative, and easily maintainable network diagrams. These visual representations play a crucial role in network documentation, communication, planning, and ultimately, ensuring the smooth operation of your network infrastructure.

IP ADDRESSING

IPv4

IP (Internet Protocol) addressing acts like a unique identification system for devices on a network, similar to how street addresses help locate houses. In this explanation, we'll delve into the core concepts of IPv4 addressing, including its format, classes, and address types.

IPv4 Address Format

An IPv4 address is a 32-bit numerical label assigned to each device on an IPv4 network. This 32-bit number is typically represented in dotted decimal notation for human readability. Here's how it breaks down:

Understanding the Breakdown

While the specific meaning of each octet can vary depending on the IP address class (discussed later), in general:

IPv4 Classes

In the early days of the internet, IPv4 addresses were classified into different categories to manage a vast but limited pool of addresses efficiently. These classes are denoted by the first octet of the IP address:

It's important to note that due to internet growth, classful addressing has largely been replaced by a more flexible approach called Classless Inter-Domain Routing (CIDR). However, understanding IP address classes provides a historical context and helps with basic IP address interpretation.

IPv4 Address Types

There are two main types of IPv4 addresses to consider:

Beyond Classes: Exploring CIDR and IPv6 Addressing

The internet has come a long way since its early days. The limitations of the traditional classful IPv4 addressing system, where IP addresses were categorized based on fixed classes (A, B, C), became evident as the number of internet users surged. To address this challenge, two key advancements emerged: Classless Inter-Domain Routing (CIDR) and IPv6 addressing.

Classless Inter-Domain Routing (CIDR)

CIDR revolutionized IP address allocation by introducing a more flexible approach. It moved away from the rigid class system and allowed for subnet masks of varying lengths, enabling a more efficient utilization of the limited IPv4 address pool.

Benefits of CIDR

IPv6 Addressing: The Future of Addressing

As the internet continued to grow, even CIDR couldn't meet the ever-increasing demand for IP addresses. This led to the development of IPv6, the next-generation addressing scheme.

Differences Between IPv4 and IPv6:

Feature IPv4 IPv6
Address Length 32 bits 128 bits
Notation Dotted decimal (e.g., 192.168.1.1) Colon-hexadecimal (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334)
Address Space Limited, susceptible to exhaustion Vast, virtually eliminates exhaustion concerns
Classes Defined classes (A, B, C) with limitations Classless, utilizes CIDR for subnet creation
Configuration Often requires manual configuration Can be automatically configured

The Transition from IPv4 to IPv6

The transition from IPv4 to IPv6 is ongoing. While IPv4 remains dominant in many networks, IPv6 adoption is steadily increasing. Understanding both CIDR and IPv6 addressing is crucial for navigating the evolving world of IP addressing and ensuring your network is prepared for the future.

Subnetting: Dividing Your Network Efficiently

Imagine a giant apartment building with a single mailbox for all residents. Chaos, right? In the world of IP networks, subnetting addresses a similar challenge. It's a technique for dividing a large network (like that apartment building) into smaller, more manageable subnetworks (like individual floors with their own mailboxes).

Why Subnet? Benefits…

Fixed vs. Variable Length Subnet Masking

Subnetting relies on a concept called subnet mask. It's a 32-bit number (similar to an IP address) that defines how many bits in an IP address represent the network portion (subnet address) and how many represent the host portion (identifies individual devices within the subnet).

There are two main subnetting approaches using subnet masks:

  1. Fixed Length Subnet Masking (FLSM):
    • Concept: All subnets within a network use the same subnet mask length.
    • Benefits: Simpler to understand and manage, especially for smaller networks.
    • Drawback: May lead to inefficient IP address utilization, especially for networks with varying device counts in different departments.
  2. Variable Length Subnet Masking (VLSM):
    • Concept: Allows for creating subnets with different subnet mask lengths, catering to the specific needs of each department or group within the network.
    • Benefits: More efficient IP address allocation, ideal for networks with diverse device requirements.
    • Drawback: Slightly more complex to design and manage compared to FLSM.

End of Outcome Quiz

1 of 20

    Quiz Score

    Percentage: 0%

    Answered Questions: 0

    Correct Answers: 0

    Faults: