Lesson 1 Introduction to Networking and Resource Management Overview
Lesson 1 Introduction to Networking and Resource Management Overview
Setup: A small business has a local area network (LAN) that connects employee
computers, printers, and a server.
Tasks:
o Configuration: The network administrator configures a router to connect the
LAN to the internet and sets up a firewall to protect against external threats.
o Monitoring: The administrator uses network monitoring tools to track
bandwidth usage and identifies peak usage times.
o Security: Regularly updates firewall rules and implements a VPN for remote
access to ensure secure connections.
o User Management: Creates user accounts for employees, assigning
appropriate permissions based on their roles.
Resource Management in Networking
Resource management in networking involves ensuring that network resources (like
bandwidth, storage, and processing power) are allocated efficiently to meet the demands of
users and applications.
Page 1 of 12
Example of Resource Management
Scenario: Cloud Resource Allocation
Setup: An organization uses cloud services to host applications and store data.
Tasks:
o Monitoring Resource Usage: The network administrator monitors CPU and
memory usage of virtual machines in real-time.
o Scaling Resources: Based on usage patterns, the administrator scales resources
up or down (e.g., increasing storage during high demand).
o Cost Management: Analyses resource consumption to optimize costs and
ensure that the organization is not overpaying for unused resources.
Types of Networks
Networks are categorized based on their size, range, and purpose:
1. LAN (Local Area Network):
Page 2 of 12
o Example: Bluetooth connection between a smartphone and a wireless
headset.
o Characteristics: Very short range, low power consumption.
Network Topologies
4. Mesh Topology:
o Description: Devices are interconnected, providing multiple paths for data
transmission.
o Advantages: High reliability and redundancy.
o Disadvantages: Expensive and complex to set up.
o Example: Military or critical infrastructure networks.
5. Hybrid Topology:
Page 3 of 12
o Advantages: Flexible and scalable.
o Disadvantages: Complex design and maintenance.
o Example: A large corporate network combining star and mesh topologies.
2. Data Link Layer: Ensures error-free data transfer between nodes (e.g., MAC
addresses).
3. Network Layer: Handles routing and forwarding of data packets (e.g., IP addresses).
4. Transport Layer: Ensures reliable data delivery (e.g., TCP, UDP).
5. Session Layer: Manages connections between applications.
6. Presentation Layer: Translates data into a readable format (e.g., encryption,
compression).
7. Application Layer: Provides network services to applications (e.g., HTTP, FTP).
TCP/IP Model:
The TCP/IP model is a simplified version of the OSI model with 4 layers:
1. Network Access Layer: Combines Physical and Data Link layers (e.g., Ethernet).
2. Internet Layer: Handles IP addressing and routing (e.g., IP, ICMP).
3. Transport Layer: Ensures data delivery (e.g., TCP, UDP).
4. Application Layer: Combines Session, Presentation, and Application layers (e.g., HTTP,
FTP, DNS).
2. Switch:
o Function: Connects devices within a LAN and forwards data based on MAC
addresses.
Page 4 of 12
o Example: A switch in an office connecting computers and printers.
3. Hub:
o Function: Connects devices in a LAN but broadcasts data to all devices (less
efficient than a switch).
o Example: An old Ethernet hub in a small network.
4. Bridge:
o Function: Connects two LANs and filters traffic based on MAC addresses.
o Example: A bridge connecting two office networks.
5. Gateway:
o Function: Connects networks with different protocols or architectures.
Analyse the two case studies to understand the unit overview of Network Administration
and Resource Management
Case 1:
Requirements:
1. Network Administration Requirements:
o Reliable and high-speed connectivity for all devices.
Page 5 of 12
o Centralized storage for collaborative work.
o Backup and recovery solutions for critical data.
o Efficient bandwidth allocation to avoid congestion.
2. Network Administration:
IP Addressing:
o Use a private IP range (e.g., 192.168.1.0/24) for the LAN.
o Assign static IPs to the server and printers, and use DHCP for workstations.
Network Security:
File Sharing:
Page 6 of 12
o Set up a file server with shared folders for different departments (e.g.,
Marketing, Design, Finance).
o Use access control lists (ACLs) to restrict access to sensitive files.
Printer Sharing:
o Connect printers to the network and configure them for shared access.
o Use Quality of Service (QoS) on the router to prioritize critical traffic (e.g., VoIP,
file transfers).
o Limit bandwidth for non-essential activities (e.g., streaming).
Implementation Steps:
1. Planning:
o Assess the office layout and plan cable routes for wired connections.
o Identify the locations for the server, switch, and access points.
2. Installation:
o Install and configure the switch, router, and server.
o Set up workstations and connect them to the network.
4. Testing:
o Test connectivity for all devices.
o Verify access to shared resources and internet connectivity.
o Perform a backup and recovery test.
Page 7 of 12
5. Training:
o Train employees on how to access shared resources and use the network
securely.
Efficiency: Employees can collaborate seamlessly with shared access to files and
printers.
Scalability: The network can easily accommodate additional devices as the firm grows.
Security: Sensitive data is protected through firewalls, VLANs, and access controls.
Cost-Effectiveness: Centralized resource management reduces hardware and
maintenance costs.
Marketing Team:
o Access to shared folders for campaign materials.
o Priority bandwidth for video conferencing tools.
Design Team:
o Access to high-performance storage for large design files.
Page 8 of 12
Previously, XYZ Corp. relied on basic wireless networking (Wi-Fi) and ad-hoc local
connections. As the company grew, several problems arose:
Slow performance: With many devices connected to the Wi-Fi, the network
performance was inconsistent.
Limited security: Sensitive customer data was at risk due to the lack of strong
segmentation and encryption.
Resource management: Resources such as printers, shared files, and servers were not
efficiently managed.
Lack of central control: IT support struggled with managing devices, monitoring traffic,
and enforcing security policies.
Business Objectives:
XYZ Corp. wanted to implement a robust Local Area Network (LAN) that would:
1. Improve network performance for employees, especially in terms of speed and
reliability.
2. Enhance security by segmenting traffic and introducing proper access controls.
3. Centralize resource management, including printers, file sharing, and application
servers.
4. Provide scalability to accommodate future growth in terms of employees, devices, and
departments.
The network design included a combination of wired and wireless infrastructure to meet
the above requirements, ensuring both efficiency and scalability.
1. Network Topology:
XYZ Corp. chose a star topology, where each employee’s workstation connects to a central
network switch. The star topology was selected due to:
Ease of management: Centralized control via switches simplifies troubleshooting.
Scalability: New workstations and devices can easily be added by connecting them to
the central switches.
Key Components of the LAN Setup:
Core Switches: High-speed switches at the core level of the network to ensure fast
communication between devices. Two core switches were deployed for redundancy
and load balancing.
Page 9 of 12
Access Switches: Located in individual floors or departments, each access switch
connects all the devices on that floor.
Wireless Access Points (WAPs): Placed strategically throughout the building for
wireless coverage. They are connected back to the network via switches, ensuring the
wireless network is part of the LAN but can be centrally managed.
2. Network Administration:
Network administration was structured around the following key practices:
IP Addressing:
o A private IP addressing scheme was used with static IP addresses for servers
and dynamic IP addresses for workstations and printers (via DHCP).
Page 10 of 12
o Network Attached Storage (NAS) was used for backups and archives, with
centralized management via a secure protocol (e.g., SMB or NFS).
Printer Management:
o Networked printers were placed on each floor, accessible from any workstation
via the LAN. Printer access was controlled through Active Directory to ensure
only authorized users could print.
Application Servers:
o Essential applications (e.g., customer relationship management software,
database servers) were hosted on dedicated application servers. These were
also connected via high-speed Ethernet to ensure minimal latency.
o A web server was hosted in-house to provide access to the company’s intranet.
Centralized Security:
o Firewalls and intrusion detection systems (IDS) were placed at the network’s
perimeter, protecting against external threats.
o Access to internal resources (e.g., file servers, printers) was controlled using
Active Directory authentication, ensuring that only authorized employees
could access sensitive information.
o Antivirus and endpoint protection software was deployed across all devices
connected to the LAN to minimize the risk of malware and other security
threats.
Page 11 of 12
3. Centralized Resource Management: IT staff had a centralized management system for
monitoring network performance, configuring devices, and troubleshooting issues.
4. Scalability: The network was able to grow as the company expanded, with minimal
disruption to operations. New employees, devices, and departments could be added
without major infrastructure changes.
5. Increased Productivity: Employees benefited from faster network access, more
reliable communication, and simplified resource management, allowing them to focus
on their work without network-related disruptions.
Page 12 of 12