Chap1 - Introduction To Network Administration
Chap1 - Introduction To Network Administration
- Introduction
- Summary
- Computer network is a
telecommunications network
that connects a collection of
computers to allow
communication and data
exchange between systems,
software applications, and users.
- The computers that are involved
in the network that originate,
route and terminate the data are
called nodes
- The interconnection of
computers is accomplished
with a combination of cable or
wireless media and
networking hardware
- Two devices are said to be
networked when a process in
one device is able to exchange
information with a process in
another device
- Homework
- Make a comparative study between the different network
types (The study concerns categories in the same
characteristics. E.g: between Mesh, star, bus, …
topologies)
- Introduction
- Summary
- A Network Administrator is an
individual, who is responsible for:
- Configuring
- Commissioning
- And maintenance of network
infrastructure and services.
- In an organization, Network
Administrator generally don’t
typically get involved directly with
users, instead focus upon
configuring, monitoring and
maintenance of network
components within organization’s
LAN/WAN infrastructure
- Depending on the organization and
its size, the Network Administrator
may also involve in design and
deployment of computer networks
➢ Update Access Control Lists (ACLs) time to time to regulate network traffic
➢ Security controls enforcement
➢ Preparing and implementation of security policy and standards
- Homework
- For each of the following elements, find the roles, the strength
and the weakness within a deployed computer network:
- Network devices routers,
- Switches,
- VPN gateways,
- Security devices-Firewall and IDS/IPS ,
- Creation of De Militarized Zones (DMZ) ,
- IP addresses allocation & management.
- Introduction
- Summary
- Linux is a Unix-like computer operating system assembled under the model of free and
open source software development and distribution (See the fsf rules)
- Linux was originally developed as a free operating system for Intel x86-based personal
computers
- It is a leading operating system and supports different computer hardware platforms like
other operating systems
- Linux also runs on embedded systems (a devices where the operating system is typically
built into the firmware and highly tailored to the system) such as mobile phones, tablet
computers, network routers, building automation controls, televisions, video game
consoles and
- The Android system, which is in wide use on mobile devices is built on the Linux kernel.
- TCP/IP ( Transmission Control Protocol (TCP) and the Internet Protocol (IP)) is a
networking model and provides end-to-end connectivity specifying how data should be
formatted, addressed, transmitted, routed and received at the destination.
- Linux provides extensive support for the TCP/IP suite, as both a protocol and a set of
services for connectivity and management of IP internetworks.
- Knowledge of the basic concepts of TCP/IP is an absolute requirement for the proper
understanding of the configuration, deployment, and troubleshooting of IP-based
Linux server
-
- The Network Interface layer also called the Network Access layer that handles placing
TCP/IP packets on the network medium and receiving TCP/IP packets off the network
medium
- The Internet layer handles addressing, packaging, and routing functions. The core
protocols of the Internet layer are IP, ARP, ICMP, and IGMP.
- The Transport layer handles and provides session and datagram communication services
to Application layer (TCP and UDP)
- The application layer provides services for an application program to ensure that
effective communication with another application program in a network is possible
(HTTP, FTP, SMTP, Telnet, DNS, RIP, SNMP, etc.)
- The TCP/IP Application layer encompasses the responsibilities of the Session,
Presentation, and Application layers of OSI model.
- Homework
- For each of the following protocols, present the working
principles and the data structure (Where it is available) for
an item sent by the protocol:
- IP, ARP, ICMP, and IGMP
- TCP and UDP
- HTTP, FTP, SMTP, Telnet, DNS, RIP, SNMP
- Introduction
- Summary
- Introduction
- Summary
- System Shutdown
- On shutdown, Init is called to close down all user space functionality in a
controlled manner, again via scripted directions, following which Init terminates
and the Kernel executes its own shutdown
- Homework
- Give 4 different commands lines that can be used to stop a
Linux operating system
- Introduction
- Summary
- General
- Controlling one's own computer from a remote location
- Shutdown
- Accessing Peripherals
- Using a network device, like printer
- Retrieving streaming data, much like a CCTV system
By Miguel Landry FOKO SINDJOUNG, PhD 50
Chap1: Introduction to Network Administration
6- User remote administration services and tools
- Some of the tasks/ services for which remote administration need to be done (2/2)
- Modifying
- Editing another computer's registry settings
- Modifying system services
- Installing software on another machine
- Modifying logical groups
- Viewing
- Remotely assisting others
- Supervising computer or internet usage
- Access to a remote system's "Computer Management" snap-in
- Hacking
- Computers infected with malware such as Trojans sometimes open back doors into
computer systems which allow malicious users to hack into and control the computer.
- Such users may then add, delete, modify or execute files on the computer to their own ends
- The following are some of proprietary and open source applications that can be
used to achieve remote Desktop administration :
- SSH
- OpenSSH
- Telnet
- rlogin
- Rsh
- PuTTY
- VNC
- FreeNX
By Miguel Landry FOKO SINDJOUNG, PhD 53
Chap1: Introduction to Network Administration
6- User remote administration services and tools
- Wireless Remote Administration
- Remote administration software has recently started to appear on wireless devices
such as the BlackBerry, Pocket PC, and Palm devices, as well as some mobile
phones.
- Generally these solutions do not provide the full remote access seen on software
such as VNC or Terminal Services, but do allow administrators to perform a
variety of tasks, such as:
- rebooting computers,
- resetting passwords,
- Thus reducing or even eliminating the need for system administrators to carry a
laptop or be within reach of the office.
- AetherPal and Netop are some of the tools used for full wireless remote access
and administration on Smartphone devices.
By Miguel Landry FOKO SINDJOUNG, PhD 54
Chap1: Introduction to Network Administration
6- User remote administration services and tools
- Disadvantages of Remote Administration
- Remote administration has many disadvantages too apart
from its advantages.
- The first and foremost disadvantage is the security.
- Generally, certain ports to be open at Server level to do remote
administration.
- Due to open ports, the hackers/attackers takes advantage to compromise the
system.
- It is advised that remote administration to be used only in emergency or
essential situations only to do administration remotely.
- Homework
- Prepare a presentation of no more than 14 slides
(including the welcome page and references) for
each of the following tools: SSH, OpenSSH. Telnet, rlogin, Rsh,
PuTTY, VNC, FreeNX
- Introduction
- Summary
- In this chapter, different roles and responsibilities of a network administrator are clearly
explained
- The TCP/IP and its role in data transmission from source to destination is
made clear.