0% found this document useful (0 votes)
3 views

Lesson 1 Introduction to Networking and Resource Management Overview

The document provides an overview of network administration and resource management, detailing key responsibilities such as network configuration, monitoring, security management, and user management. It also discusses various types of networks (LAN, WAN, MAN, PAN) and topologies (star, bus, ring, mesh, hybrid), along with the OSI and TCP/IP models. Additionally, it presents two case studies illustrating the implementation of LAN setups for small and mid-sized businesses, highlighting their specific requirements and proposed solutions.

Uploaded by

elistragis
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Lesson 1 Introduction to Networking and Resource Management Overview

The document provides an overview of network administration and resource management, detailing key responsibilities such as network configuration, monitoring, security management, and user management. It also discusses various types of networks (LAN, WAN, MAN, PAN) and topologies (star, bus, ring, mesh, hybrid), along with the OSI and TCP/IP models. Additionally, it presents two case studies illustrating the implementation of LAN setups for small and mid-sized businesses, highlighting their specific requirements and proposed solutions.

Uploaded by

elistragis
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Lesson 1 Introduction to Networking and Resource Management Overview

Network Administration and Resource Management


Definition
Network Administration involves managing and maintaining a computer network, ensuring
that it operates efficiently and securely. This includes configuring network hardware, software,
and services, monitoring network performance, and troubleshooting issues.
Resource Management refers to the effective and efficient deployment and allocation of
resources, such as hardware, software, data, and personnel, to achieve organizational goals.
Key Responsibilities of Network Administration
1. Network Configuration: Setting up routers, switches, and firewalls.
2. Monitoring: Keeping track of network performance and managing bandwidth.

3. Security Management: Implementing security protocols to protect against


unauthorized access and cyber threats.
4. User Management: Creating and managing user accounts and permissions.
5. Troubleshooting: Diagnosing and resolving network issues.
Example of Network Administration
Scenario: A Small Business Network

 Setup: A small business has a local area network (LAN) that connects employee
computers, printers, and a server.

 Tasks:
o Configuration: The network administrator configures a router to connect the
LAN to the internet and sets up a firewall to protect against external threats.
o Monitoring: The administrator uses network monitoring tools to track
bandwidth usage and identifies peak usage times.
o Security: Regularly updates firewall rules and implements a VPN for remote
access to ensure secure connections.
o User Management: Creates user accounts for employees, assigning
appropriate permissions based on their roles.
Resource Management in Networking
Resource management in networking involves ensuring that network resources (like
bandwidth, storage, and processing power) are allocated efficiently to meet the demands of
users and applications.

Page 1 of 12
Example of Resource Management
Scenario: Cloud Resource Allocation
 Setup: An organization uses cloud services to host applications and store data.

 Tasks:
o Monitoring Resource Usage: The network administrator monitors CPU and
memory usage of virtual machines in real-time.
o Scaling Resources: Based on usage patterns, the administrator scales resources
up or down (e.g., increasing storage during high demand).
o Cost Management: Analyses resource consumption to optimize costs and
ensure that the organization is not overpaying for unused resources.
Types of Networks
Networks are categorized based on their size, range, and purpose:
1. LAN (Local Area Network):

o Description: A network that covers a small geographic area, such as a home,


office, or building.

o Example: A Wi-Fi network in your home or a wired network in an office.


o Characteristics: High speed, low cost, and limited range.
2. WAN (Wide Area Network):
o Description: A network that spans a large geographic area, often connecting
multiple LANs.
o Example: The internet or a corporate network connecting offices in different
cities.
o Characteristics: Slower speed, higher cost, and large range.

3. MAN (Metropolitan Area Network):


o Description: A network that covers a city or campus, larger than a LAN but
smaller than a WAN.
o Example: A network connecting all branches of a university within a city.
o Characteristics: Moderate speed and range.
4. PAN (Personal Area Network):
o Description: A network for personal devices within a short range (a few
meters).

Page 2 of 12
o Example: Bluetooth connection between a smartphone and a wireless
headset.
o Characteristics: Very short range, low power consumption.

Network Topologies

Network topology refers to the arrangement of devices in a network. Common topologies


include:
1. Star Topology:
o Description: All devices are connected to a central hub or switch.
o Advantages: Easy to set up and troubleshoot.
o Disadvantages: Failure of the central hub disrupts the entire network.

o Example: Home Wi-Fi networks.


2. Bus Topology:
o Description: All devices are connected to a single communication line (bus).
o Advantages: Simple and cost-effective.
o Disadvantages: A single point of failure can bring down the network.

o Example: Early Ethernet networks.


3. Ring Topology:
o Description: Devices are connected in a circular fashion, with data traveling in
one direction.
o Advantages: Equal access to resources.
o Disadvantages: Failure of one device can disrupt the entire network.
o Example: Token Ring networks.

4. Mesh Topology:
o Description: Devices are interconnected, providing multiple paths for data
transmission.
o Advantages: High reliability and redundancy.
o Disadvantages: Expensive and complex to set up.
o Example: Military or critical infrastructure networks.
5. Hybrid Topology:

o Description: A combination of two or more topologies.

Page 3 of 12
o Advantages: Flexible and scalable.
o Disadvantages: Complex design and maintenance.
o Example: A large corporate network combining star and mesh topologies.

OSI Model & TCP/IP Model


OSI Model (Open Systems Interconnection):
The OSI model is a conceptual framework with 7 layers, each with specific functions:
1. Physical Layer: Transmits raw bits over a physical medium (e.g., cables, Wi-Fi).

2. Data Link Layer: Ensures error-free data transfer between nodes (e.g., MAC
addresses).

3. Network Layer: Handles routing and forwarding of data packets (e.g., IP addresses).
4. Transport Layer: Ensures reliable data delivery (e.g., TCP, UDP).
5. Session Layer: Manages connections between applications.
6. Presentation Layer: Translates data into a readable format (e.g., encryption,
compression).
7. Application Layer: Provides network services to applications (e.g., HTTP, FTP).

TCP/IP Model:
The TCP/IP model is a simplified version of the OSI model with 4 layers:
1. Network Access Layer: Combines Physical and Data Link layers (e.g., Ethernet).
2. Internet Layer: Handles IP addressing and routing (e.g., IP, ICMP).
3. Transport Layer: Ensures data delivery (e.g., TCP, UDP).

4. Application Layer: Combines Session, Presentation, and Application layers (e.g., HTTP,
FTP, DNS).

Introduction to Networking Devices


1. Router:
o Function: Connects different networks and routes data packets between them.
o Example: A home router connecting your LAN to the internet.

2. Switch:
o Function: Connects devices within a LAN and forwards data based on MAC
addresses.

Page 4 of 12
o Example: A switch in an office connecting computers and printers.
3. Hub:
o Function: Connects devices in a LAN but broadcasts data to all devices (less
efficient than a switch).
o Example: An old Ethernet hub in a small network.

4. Bridge:
o Function: Connects two LANs and filters traffic based on MAC addresses.
o Example: A bridge connecting two office networks.
5. Gateway:
o Function: Connects networks with different protocols or architectures.

o Example: A gateway connecting a LAN to a WAN or the internet.

Analyse the two case studies to understand the unit overview of Network Administration
and Resource Management

Case 1:

Business Case Study: LAN Setup for a Small Office


Scenario:
A small marketing firm, Creative Works, is expanding its operations and needs to set up a Local
Area Network (LAN) in its new office. The firm has 20 employees, and the office space includes
a mix of workstations, printers, and a central server. The goal is to ensure efficient
communication, resource sharing, and secure data management.

Requirements:
1. Network Administration Requirements:
o Reliable and high-speed connectivity for all devices.

o Centralized management of network resources.


o Scalability to accommodate future growth.
o Secure access to sensitive data.
2. Resource Management Requirements:
o Shared access to printers and files.

Page 5 of 12
o Centralized storage for collaborative work.
o Backup and recovery solutions for critical data.
o Efficient bandwidth allocation to avoid congestion.

Proposed LAN Setup:


1. Network Design:
 Topology: Star topology (most suitable for small offices).
o All devices connect to a central switch for easy management and
troubleshooting.
 Hardware:

o Switch: A 24-port Gigabit Ethernet switch to connect all devices.


o Router: A business-grade router to connect the LAN to the internet.
o Server: A central server for file storage, backups, and hosting shared
applications.
o Access Points: Wireless access points for Wi-Fi connectivity.
o Printers: Network printers connected to the LAN for shared access.

2. Network Administration:
 IP Addressing:
o Use a private IP range (e.g., 192.168.1.0/24) for the LAN.
o Assign static IPs to the server and printers, and use DHCP for workstations.
 Network Security:

o Implement a firewall on the router to block unauthorized access.


o Use VLANs to segment the network (e.g., separate VLANs for workstations,
servers, and guests).
o Enable WPA3 encryption for Wi-Fi.
 Monitoring and Management:
o Use network monitoring tools (e.g., PRTG, Nagios) to track performance and
detect issues.
o Regularly update firmware on routers, switches, and access points.
3. Resource Management:

 File Sharing:

Page 6 of 12
o Set up a file server with shared folders for different departments (e.g.,
Marketing, Design, Finance).
o Use access control lists (ACLs) to restrict access to sensitive files.
 Printer Sharing:
o Connect printers to the network and configure them for shared access.

o Use print management software to monitor usage and allocate resources.


 Backup and Recovery:
o Implement a backup solution (e.g., NAS or cloud backup) to store critical data.
o Schedule daily backups and test recovery procedures.
 Bandwidth Management:

o Use Quality of Service (QoS) on the router to prioritize critical traffic (e.g., VoIP,
file transfers).
o Limit bandwidth for non-essential activities (e.g., streaming).

Implementation Steps:
1. Planning:

o Assess the office layout and plan cable routes for wired connections.
o Identify the locations for the server, switch, and access points.
2. Installation:
o Install and configure the switch, router, and server.
o Set up workstations and connect them to the network.

o Configure network printers and shared folders.


3. Configuration:
o Set up DHCP for automatic IP assignment.
o Configure VLANs and firewall rules.
o Enable file and printer sharing on the server.

4. Testing:
o Test connectivity for all devices.
o Verify access to shared resources and internet connectivity.
o Perform a backup and recovery test.

Page 7 of 12
5. Training:
o Train employees on how to access shared resources and use the network
securely.

Benefits of the LAN Setup:

 Efficiency: Employees can collaborate seamlessly with shared access to files and
printers.
 Scalability: The network can easily accommodate additional devices as the firm grows.
 Security: Sensitive data is protected through firewalls, VLANs, and access controls.
 Cost-Effectiveness: Centralized resource management reduces hardware and
maintenance costs.

Example of Resource Allocation:

 Marketing Team:
o Access to shared folders for campaign materials.
o Priority bandwidth for video conferencing tools.
 Design Team:
o Access to high-performance storage for large design files.

o Dedicated printers for high-quality prints.


 Finance Team:
o Restricted access to financial data with strict ACLs.
o Regular backups of financial records.
Case 2:

Business Case Study: LAN Setup for XYZ Corp.


Company Overview:
XYZ Corporation is a mid-sized software development company that employs 200 employees.
The company has various departments, including development, sales, marketing, and
customer support. They recently expanded into a larger office building and needed to upgrade
their network infrastructure to ensure efficient collaboration, secure data sharing, and
centralized resource management.
Problem:

Page 8 of 12
Previously, XYZ Corp. relied on basic wireless networking (Wi-Fi) and ad-hoc local
connections. As the company grew, several problems arose:
 Slow performance: With many devices connected to the Wi-Fi, the network
performance was inconsistent.
 Limited security: Sensitive customer data was at risk due to the lack of strong
segmentation and encryption.
 Resource management: Resources such as printers, shared files, and servers were not
efficiently managed.
 Lack of central control: IT support struggled with managing devices, monitoring traffic,
and enforcing security policies.
Business Objectives:

XYZ Corp. wanted to implement a robust Local Area Network (LAN) that would:
1. Improve network performance for employees, especially in terms of speed and
reliability.
2. Enhance security by segmenting traffic and introducing proper access controls.
3. Centralize resource management, including printers, file sharing, and application
servers.
4. Provide scalability to accommodate future growth in terms of employees, devices, and
departments.

Solution: LAN Setup Design

The network design included a combination of wired and wireless infrastructure to meet
the above requirements, ensuring both efficiency and scalability.

1. Network Topology:
XYZ Corp. chose a star topology, where each employee’s workstation connects to a central
network switch. The star topology was selected due to:
 Ease of management: Centralized control via switches simplifies troubleshooting.
 Scalability: New workstations and devices can easily be added by connecting them to
the central switches.
Key Components of the LAN Setup:
 Core Switches: High-speed switches at the core level of the network to ensure fast
communication between devices. Two core switches were deployed for redundancy
and load balancing.

Page 9 of 12
 Access Switches: Located in individual floors or departments, each access switch
connects all the devices on that floor.
 Wireless Access Points (WAPs): Placed strategically throughout the building for
wireless coverage. They are connected back to the network via switches, ensuring the
wireless network is part of the LAN but can be centrally managed.
2. Network Administration:
Network administration was structured around the following key practices:
 IP Addressing:

o A private IP addressing scheme was used with static IP addresses for servers
and dynamic IP addresses for workstations and printers (via DHCP).

o Each department was allocated a specific subnet to ensure proper traffic


segregation and management.
 VLANs (Virtual Local Area Networks):
o Separate VLANs were created for each department (e.g., Development,
Marketing, Sales) to ensure security and efficiency. Traffic from one
department does not unnecessarily impact others, improving overall network
performance.
o Voice VLAN: A separate VLAN was configured for VoIP phones to ensure high-
quality voice communication.
o Management VLAN: A dedicated VLAN for IT administrators to manage and
configure networking equipment (e.g., switches, routers).
 Routing and Switching:
o Layer 3 switches were deployed at the core level to handle inter-VLAN routing
(also known as routing between VLANs) for seamless communication between
departments.
o Port security on switches was configured to prevent unauthorized devices from
connecting to the network.
o QoS (Quality of Service) policies were implemented to prioritize critical traffic
(like VoIP or video conferencing) over less time-sensitive traffic (like file
downloads).
3. Resource Management:
Resource management was optimized with the following strategies:
 File Sharing and Centralized Storage:
o A dedicated file server was set up to handle internal file storage and sharing.
Shared drives were allocated per department for easy access and collaboration.

Page 10 of 12
o Network Attached Storage (NAS) was used for backups and archives, with
centralized management via a secure protocol (e.g., SMB or NFS).
 Printer Management:
o Networked printers were placed on each floor, accessible from any workstation
via the LAN. Printer access was controlled through Active Directory to ensure
only authorized users could print.
 Application Servers:
o Essential applications (e.g., customer relationship management software,
database servers) were hosted on dedicated application servers. These were
also connected via high-speed Ethernet to ensure minimal latency.
o A web server was hosted in-house to provide access to the company’s intranet.

 Centralized Security:
o Firewalls and intrusion detection systems (IDS) were placed at the network’s
perimeter, protecting against external threats.
o Access to internal resources (e.g., file servers, printers) was controlled using
Active Directory authentication, ensuring that only authorized employees
could access sensitive information.
o Antivirus and endpoint protection software was deployed across all devices
connected to the LAN to minimize the risk of malware and other security
threats.

4. Scalability and Future-Proofing:


The network design included future-proofing strategies:
 The core network infrastructure (switches, routers) was designed to handle higher
traffic loads with minimal upgrades.
 Fiber optic cables were used for connecting core switches to support faster speeds and
longer distances.
 The wireless network was designed to handle future upgrades to 802.11ax (Wi-Fi 6)
for higher speeds and better coverage.

Outcome and Benefits:

1. Improved Performance: The switch-based network eliminated bottlenecks, providing


high-speed and reliable communication between workstations and servers.
2. Better Security: By implementing VLANs and proper access controls, traffic was
segmented, and unauthorized access was minimized. The company was able to ensure
that sensitive data was protected.

Page 11 of 12
3. Centralized Resource Management: IT staff had a centralized management system for
monitoring network performance, configuring devices, and troubleshooting issues.
4. Scalability: The network was able to grow as the company expanded, with minimal
disruption to operations. New employees, devices, and departments could be added
without major infrastructure changes.
5. Increased Productivity: Employees benefited from faster network access, more
reliable communication, and simplified resource management, allowing them to focus
on their work without network-related disruptions.

Page 12 of 12

You might also like