Chapter 1 - Introduction and Background
Chapter 1 - Introduction and Background
Computer software, also known as programs or applications, are the intangible components of the
computer system. They can be classified into two main classes namely – system software and
application software.
Network Overview
A network can be defined as two or more computers connected together in such a way that they can
share resources. The primary purpose of a network is to share resources, and a resource could be:
➢ a file,
➢ a folder,
➢ a printer,
➢ a disk drive,
➢ or just about anything else that exists on a computer.
Therefore, a computer network is simply a collection of computers or other hardware devices that are
connected together, either physically or logically, using special hardware and software, to allow them to
exchange information and cooperate. Networking is the term that describes the processes involved in
designing, implementing, upgrading, managing and otherwise working with networks and network
technologies.
There are different types of a computer networks based on their respective attributes. These includes:
geographical span, inter-connectivity (physical topology), administration and architecture.
Geographical Span: based on geographical area it covers there are different types of network:
➢ Personal Area Network (PAN): is a network may be spanned across a given table with
distances between the devices not more than few meters. The technology used to interconnect
the devices could be a Bluetooth. These networks are called Personal Area Networks, since the
devices interconnected in these networks are belongs to a single person.
1
Chapter 1: Introduction and Background
➢ Local Area Network (LAN): is a network that may span across a building, or across several
buildings within a single organization, by using an intermediate devices, like switches and/or
hubs, to interconnect devices in all floors. Sometimes such kind of networks are
➢ Metropolitan Area Network (MAN): is a network that may span across a whole city
interconnecting several buildings and organizations.
➢ Wide Area Network (WAN): is a network that may span across multiple cities, or an entire
country, or an entire continent, or it may even cover the whole world. For example, an Internet
is one example of WAN.
Inter-connectivity: components of a network, including end devices and interconnecting devices, can
be connected to each other differently in some fashion. By connectedness we mean either logically,
physically or both ways. Network topology refers to the shape of a network, or the network's layout. It
is the geometric representation of the relationship of all the links and linking devices to one another.
There are four basic types of topologies, namely bus, star, ring and mesh topologies.
➢ Bus Topology: in this topology all devices are connected to a central cable, called the bus or
backbone, which is terminated at its ends (see figure 1.1 a). The purpose of the terminators is to
stop the signal from bouncing, thereby clearing the cable so that other computers can send data.
Message transmitted along the Bus is visible to all computers connected to the backbone cable.
As the message arrives at each workstation, the workstation checks the destination address
contained in the message either to process or drop the packet if it matches or not respectively.
Its advantages are, ease of installation and less amount of cable requirement. Its main drawback
is, the entire network will be shutdown if there is a break in the main cable.
➢ Star Topology: in this topology, each node is connected directly to a central device called a hub
or a switch (see figure 1.1 b). Data on a star network passes through the central device (switch)
before continuing to its destination. The central device manages and controls all functions of the
network. This configuration is common with twisted pair cable. RJ-45 Connectors are used to
connect the cable to the Network Interface Card (NIC) of each computer. Its advantages
include, ease of installation and reconfiguration, robust (ease of fault identification and
isolation), link failure only affects device(s) connected to that link, and is less expensive than
mesh. Its drawbacks include more cable requirements (than bus and ring) and single point of
failure (if central device fail, the whole system will be down).
➢ Ring Topology: in this topology, all devices are connected to one another in the shape of a
closed loop, so that each device is connected directly to two other devices, one on either side of
it (see figure 1.1 c). Some of its advantages include, easy to install and reconfigure, less
expensive (than mesh), and performance is even despite the number of users. Its cons include,
break in the ring (such as a disabled station) can disable the entire network, and limitations on
media and traffic (limitation on ring length and number of devices).
2
Chapter 1: Introduction and Background
➢ Mesh Topology: in this topology devices are connected with many redundant interconnections
between network nodes. In a full mesh topology (see figure 1.1 d), every node has a connection
to every other node in the network, which makes it the most expensive topology over all the
other topologies. The number of cables grows fast as the number of nodes increases, and it can
be calculated by using the general formula ((n (n - 1)) /2) , where n is the number of nodes in
the network. It has several benefits, such as: dedicated links between devices, robust (single link
failure don’t affect entire network), privacy/security (direct communication between
communicating devices), and ease of fault identification and isolation. Its drawbacks include,
installation and reconnection are difficult (large number of cables), huge amount of cables
consumes a lot of space, and it is the most expensive of all.
➢ Hybrid Topology: A network structure whose design contains more than one topology is said to
be Hybrid Topology. Hybrid topology inherits merits and demerits of all the incorporating
topologies. As its name indicates, this topology can be created by merging one or more of the
above basic topologies. Figure 1.1 e shows hybrid topology that made up of ring and star.
3
Chapter 1: Introduction and Background
Administration: From administrator's point of view, a network can be private network which belongs
to a single autonomous system and cannot accessed outside of its physical or logical domain. Or a
network can be public network, which can be accessed by anyone inside or outside of an organization.
Network Architecture: based on the architecture (where do the clients get the shared resources?),
networks can be categorized into three:
➢ Client-Server Architecture: There can be one or more systems acting as Server. Other being
Client, request the Server to serve requests. Servers take and process request on clients’ behalf.
➢ Peer-to-Peer (Point-to-point): Two systems can be connected Point-to-Point, or in other words
back-to-back fashion. They both reside on same level and called peers.
➢ There can be hybrid network which involves network architecture of both the above types.
Figure 1.2. Client-Server (left) and Peer-to-Peer (right) network
While to devices communicate with each other, the same protocol must be used on the sending and
receiving devices. It is possible for two devices that use different protocols to communicate with each
other, but a gateway is needed in between.
4
Chapter 1: Introduction and Background
TCP/IP is a hierarchical protocol made up of interactive modules, each of which provides a specific
functionality; however, the modules are not necessarily interdependent. Whereas the OSI model
specifies which functions belong to each of its layers, the layers of TCP/IP suite contain relatively
independent protocols that can be mixed and matched depending on the needs of the system. The term
hierarchical means that each upper-level protocol is supported by one or more lower-level protocols.
At the transport layer, TCP/IP defines three protocols: Transmission Control Protocol (TCP), User
Datagram Protocol (UDP), and Stream Control Transmission Protocol (SCTP). At the network layer,
the main protocol defined by TCP/IP is the Internetworking Protocol (IP); there are also some other
protocols that support data movement in this layer.
5
Chapter 1: Introduction and Background
any specific network technology gives TCP/IP the ability to be adapted to new technologies such as
Asynchronous Transfer Mode (ATM).
Network Access layer uses a physical address to identify hosts and to deliver data.
➢ The Network Access layer PDU is called a frame. It contains the IP packet as well as a protocol
header and trailer from this layer.
➢ The Network Access layer header and trailer are only relevant in the physical network. When a
router receives a frame, it strips of the header and trailer and adds a new header and trailer
before sending it out the next physical network towards the destination.
The Network Access layer manages all the services and functions necessary to prepare the data for the
physical network. These responsibilities include:
➢ Interfacing with the computer's network adapter.
➢ Coordinating the data transmission with the conventions of the appropriate access method.
➢ Formatting the data into a unit called a frame and converting that frame into the stream of
electric or analog pulses that passes across the transmission medium.
➢ Checking for errors in incoming frames.
➢ Adding error-checking information to outgoing frames so that the receiving computer can check
the frame for errors.
➢ Acknowledging receipt of frames and resending frames if acknowledgment is not received.
6
Chapter 1: Introduction and Background
are usually all that is required of a user. These steps are becoming simpler with the improved plug-and-
play features of desktop operating systems.
7
Chapter 1: Introduction and Background
IP address assigned to that MAC address. A designated machine, called a RARP server,
responds with the answer, and the identity crisis is over.
8
Chapter 1: Introduction and Background
If a port is closed/blocked, you cannot communicate with the computer by the protocol using that port.
For example, if port 25 is blocked you cannot send mail. Firewalls by default block all ports. You
should know the port numbers of different protocols!!
TCP Ports UDP Ports
Protocol TCP Port Number Protocol TCP Port Number
Telnet 23 SNMP 161
SMTP 25 TFTP 69
HTTP 80 DNS 53
FTP 21 POP3 110
DNS 53 DHCP 68
HTTPS 443 NTP 123
SSH 22 RPC 530
Table 1.1. Sample TCP and UDP port numbers from well-known category
(4) Application Layer
The application layer in TCP/IP is equivalent to the combined session, presentation, and application
layers in the OSI model, and many protocols are defined at this layer.
9
Chapter 1: Introduction and Background
Simple Network Management Protocol (SNMP): collects and manipulates valuable network
information. This protocol stands as a watchdog over the network, quickly notifying managers
of any sudden turn of events.
Domain Name Service (DNS): resolves hostnames—specifically, Internet names, such as
www.wcu.edu.et to the IP address 10.6.10.3
Dynamic Host Configuration Protocol (DHCP): gives IP addresses to hosts. It allows easier
administration and works well in small-to-even-very large network environments.
10
Chapter 1: Introduction and Background
databases, installation, maintenance and upgrading of software, management of user accounts and
security groups, desktop support, and sometimes even basic software development.
Network administrator is a person who is responsible for installing, update, configuring network
devices. Troubleshoot and maintain network devices work on routers, cabling, Phone system (VoIP),
switches and firewalls.
As with Network Administrator positions, specific daily job duties may depend on the size and scope of
a company's computer systems. At smaller businesses, the System Administrator may handle all IT
duties, and thus maintain and update all computers as well as ensure data security and backup. Larger
corporations may divide system administrators' responsibilities into more specific sub-roles, therefore
resulting in specialized positions like database administrators or security administrators.
System administration refers to the management of one or more hardware and software systems. The
task is performed by a system administrator who monitors system health, monitors and allocates system
resources like disk space, performs backups, provides user access, manages user accounts, monitors
system security and performs many other functions.
System administration is a job done by IT experts for an organization. The job is to ensure that
computer systems and all related services are working well. The duties in system administration are
wide ranging and often vary depending on the type of computer systems being maintained, although
most of them share some common tasks that may be executed in different ways.
Common tasks include installation of new hardware or software, creating and managing user accounts,
maintaining computer systems such as servers and databases, and planning and properly responding to
system outages and various other problems. Other responsibilities may include light programing or
scripting to make the system work flows easier as well as training computer users and assistants.
Whereas system administrator is a person who is responsible for active configure reliable of computer
systems especially multi user computers such as servers. System administrator ensures the up time,
performance, resources and security of the computers. And also install, upgrade hardware and software
11
Chapter 1: Introduction and Background
components. System administrator maintain security polices and troubleshoot. System administrator
install server operating system and work on/with servers/vendors.
Although the specifics of being a system administrator may change from platform to platform, there are
underlying themes that do not. These themes make up the philosophy of system administration. The
themes are:
➢ Automate everything
➢ Document everything
➢ Communicate as much as possible
➢ Know your resources
➢ Know your users
➢ Know your business
➢ Security cannot be an afterthought
➢ Plan ahead
➢ Expect the unexpected
➢ Backup and disaster recovery planning
➢ Patching
Automate Everything
Most system administrators are outnumbered — either by their users, their systems, or both. In many
cases, automation is the only way to keep up. In general, anything done more than once should be
examined as a possible candidate for automation. Here are some commonly automated tasks:
➢ Free disk space checking and reporting
➢ Backups
➢ System performance data collection
➢ User account maintenance (creation, deletion, etc.)
➢ Business-specific functions (pushing new data to a Web server, running
monthly/quarterly/yearly reports, etc.)
This list is by no means complete; the functions automated by system administrators are only limited
by an administrator's willingness to write the necessary scripts.
Document Everything
If given the choice between installing a brand-new server and writing a procedural document on
performing system backups, the average system administrator would install the new server every time.
While this is not at all unusual, you must document what you do. Many system administrators put off
doing the necessary documentation for a variety of reasons:
What should you document? Here is a partial list:
12
Chapter 1: Introduction and Background
➢ Hardware inventory: Maintain lists of all your physical and virtual servers with the following
details:
• OS: Linux or Windows, hypervisor with versions
• RAM: DIMM slots in physical servers
• CPU: Logical and virtual CPUs
• HDD: Type and size of hard disks
• External storage (SAN/NAS): Make and model of storage with management IP address
and interface IP address
• Open ports: Ports opened at the server end for incoming traffic
• IP address: Management and interface IP address with VLANs
• Engineering appliances: e.g., Exalogic, PureApp, etc.
➢ Software inventory:
• Configured applications: e.g., Oracle WebLogic, IBM WebSphere Application Server,
Apache Tomcat, Red Hat JBoss, etc.
• Third-party software: Any software not shipped with the installed OS
➢ License details
• Maintain license counts and details for physical servers and virtual servers (VMs), including
licenses for Windows, subscriptions for Linux OS, and the license limit of hypervisor host.
➢ Policies: Policies are written to formalize and clarify the relationship you have with your user
community. They make it clear to your users how their requests for resources and/or assistance
are handled. The nature, style, and method of disseminating policies to your a community varies
from organization to organization.
➢ Procedures: Procedures are any step-by-step sequence of actions that must be taken to
accomplish a certain task. Procedures to be documented can include backup procedures, user
account management procedures, problem reporting procedures, and so on. Like automation, if
a procedure is followed more than once, it is a good idea to document it.
➢ Changes: A large part of a system administrator's career revolves around making changes
configuring systems for maximum performance, tweaking scripts, modifying configuration
files, and so on. All of these changes should be documented in some fashion. Otherwise, you
could find yourself being completely confused about a change you made several months earlier.
Some organizations use more complex methods for keeping track of changes, but in many cases
a simple revision history at the start of the file being changed is all that is necessary. At a
minimum, each entry in the revision history should contain:
The name or initials of the person making the change
The date the change was made
The reason the change was made
13
Chapter 1: Introduction and Background
Patching
Operating system patches for known vulnerabilities must be implemented promptly. There are many
types and levels of patches, including:
➢ Security
➢ Critical
➢ Moderate
When a patch released, check the bug or vulnerability details to see how it applies to your system (e.g.,
does the vulnerability affect the hardware in your system?), and take any necessary actions to apply the
patches when required. Make sure to cross-verify applications' compatibility with patches or upgrades.
Server hardening
Linux:
➢ Set a BIOS password: This prevents users from altering BIOS settings.
➢ Set a GRUB password: This stops users from altering the GRUB bootloader.
➢ Deny root access: Rejecting root access minimizes the probability of intrusions.
➢ Sudo users: Make sudo users and assign limited privileges to invoke commands.
➢ TCP wrappers: This is the weapon to protect a server from hackers. Apply a rule for the SSH
daemon to allow only trusted hosts to access the server, and deny all others. Apply similar rules
for other services like FTP, SSH File Transfer Protocol, etc.
➢ Firewalld/iptables: Configure firewalld and iptables rules for incoming traffic to the server.
Include the particular port, source IP, and destination IP and allow, reject, deny ICMP requests,
etc. for the public zone and private zone.
➢ Antivirus: Install antivirus software and update virus definitions regularly.
➢ Secure and audit logs: Check the logs regularly and when required.
➢ Rotate the logs: Keep the logs for limited period of time like "for 7 days", to keep the sufficient
disk space for flawless operation.
Windows:
➢ Set a BIOS password: This prevents users from altering BIOS settings.
➢ Antivirus: Install antivirus software and update virus definitions regularly.
14
Chapter 1: Introduction and Background
➢ Configure firewall rules: Prevent unauthorized parties from accessing your systems.
➢ Deny administrator login: Limit users' ability to make changes that could increase your
systems' vulnerabilities.
15