52
NETWORK SYSTEMS 3.02 UNDERSTAND NETWORK MANAGEMENT.

N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

Embed Size (px)

Citation preview

Page 1: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

NETWORK SYSTEMS

3.02 UNDERSTAND NETWORK MANAGEMENT.

Page 2: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

Networks and the Internet

Network Admins

Network Types

Data Flow

Internet Speed

Security Risks

COURSE CONTENT

Page 3: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

Protect The Data

Learn How Data

Flows

Understand

Media

GOALS

Page 4: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

Definition• Is responsible for configuring a network system

and managing its operations.

Responsibilities include:• Network configuration• Network design and supervision • Monitoring and filtering• Maintaining and securing• Updating and backing up

NETWORK ADMINISTRATOR

Page 5: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

Network configuration• Is the overall design of a communications

network• Software and hardware are arranged in a way

that allows efficiency in the process of transmitting data across the network.

NETWORK ADMINISTRATOR

Page 6: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

Designing, setting up and maintaining networks• Network admin selects and sets up hardware

networks (often cabling done by laborers) • Network admin selects and utilizes network

storage, both client and sever, on a variety of platforms for upgrading and maintaining networks and telecommunications.

NETWORK ADMINISTRATOR

Page 7: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

Manages networks using Network Operating Systems• Network Operating System (NOS) is an operating system

that includes special functions for connecting computers and devices into a local-area network.Examples of client-server NOS include:• Novell• Windows• Linux

Examples of NOS that are embedded in network devices and firewalls• Cisco IOS

NOS for peer-to-peer• Windows workgroup• AppleShare

NETWORK ADMINISTRATOR

Page 8: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

Monitors the network using monitoring and filtering software

• Networking monitoring software uses TCP (Transmission Control Protocol) ports to monitor and report on network activities and systems availability.

• Network monitoring systems are used to monitor network devices and printers, computer temperature, network interfaces, and disk memory. The software can prevent malicious attacks on a computer.

NETWORK ADMINISTRATOR

Page 9: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

Security and analytics• Ensures the security of the network using software that

protects computers from malicious software attacks.• Analyzes the network using system analyzing software

identifies and reports locations where computers are experiencing difficulties like slow downs, viral attacks or hacking.

NETWORK ADMINISTRATOR

Page 10: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

Maintaining network operations and software applications, and server backups

• Workstations are often set up to be uniform through the use of ghosting or imaging software. A single computer is configured and the computer’s image is transferred to other computers.

• Back up software and hardware provides a way to recover files.

• Virtual desktops or thin client software can be used to provide the same desktop configuration to groups of users.

• Recommends equipment, software, supplies and materials.

NETWORK ADMINISTRATOR

Page 11: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

Network access• Network admin must determine the amount of access given

to users on the network.• Network access involves setting roles, privileges and rights.

• Roles can permit a user to temporarily receive certain rights.

• Rights are permissions to a resource. Rights are typically granted to either users or groups.

• A privilege is often used to reference specific tasks that a user can perform.

• Rights, permissions and privileges impact the ability of users to access directories, files, applications and devices on a network.

NETWORK ADMINISTRATOR

Page 12: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

Defining roles• System Administrator or Sys Admin is defined as the

administrator role in a given system. This role creates user accounts and other network objects.

• Network user is the account that gives a user access to a network.

• Application roles are defined for users who have the privileges to use and modify applications, such as databases.

• User roles can be defined for individuals or groups.

NETWORK ADMINISTRATOR

Page 13: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

Defining profiles• Profiles contain settings for the network environment,

such as desktop configuration and menu options.• Profiles are used to identify common conditions under

which a user group, identified by roles, can access resources or provide a desktop arrangement.

NETWORK ADMINISTRATOR

Page 14: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

Intranet• A private network that facilitates communication

between departments of an organization or business

• Intranets are accessible by employees inside the organization.

• Cannot be accessed from the outside without the use of an extranet

LIMITED NETWORK CONNECTIVITY

Admin

Shipping

Personnel

Page 15: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

Extranet• A network that allows limited access from outside

a private network associated with a company• Used for business partners and employees to

conduct business from remote locations• Allows business partners to access data to

speed up shipping or manage services.

LIMITED NETWORK CONNECTIVITY

AdminShippin

g Personnel

HomeExtranet

Page 16: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

• Based on data flow• Data flow is the flow of bits of data from one

device on the network to another.• Encapsulation – The creating and formatting of

the data to be sent.• De-encapsulation – The removal of the control

information of the message once it reaches the destination.

INTERNET CONNECTIVITY

Page 17: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

• Bandwidth – Theoretical amount of data that can be transmitted across a given medium

• Throughput – The actual amount of data that can be transmitted across a given medium

• Units of Measurement:• Bits per second (bps) = a small text message• Kilobits per second (Kbps) = a text document• Megabits per second (Mbps) = one or two photos• Gigabits per second (Gbps) = a movie

MEASURING INTERNET DATA FLOW

Page 18: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

• Estimated bandwidth through different transmission• Dial-up connection with modem – 56 Kbitsps• DSL (digital subscriber line) – 10 Mbitsps• Cable connection – 30 Mbitsps• T1 line – 1.544 Mbitsps

• A T1 line is dedicated to a certain location often reaching speeds higher than DSL or cable.

• Ethernet – 10 Mbitsps• Fast Ethernet – 100 Mbitsps• Fiber optics – 100 Gbitsps• Satelittle – 400 Kbitsps• *all speeds are listed in their max states

MEASURING INTERNET DATA FLOW

Page 19: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

• Bandwidth refers to ideal conditions for network speed.

• How fast could you go if you were the only caron the highway?

• Some providers charge extra for overage of bandwidth limits.

• High speed internet users may have their connection reduced when they reach the limit of the connection to help providers ensure that all users have access.

• Internet connections will only travel as fast as your cable will allow.

BANDWIDTH

Page 20: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

• Throughput is the actual amount of data that can be transmitted across a given media relative to the restrictions and resistance of the media.

• What if the road wasn’t straight, or there was road construction?

THROUGHPUT

Network Limitations:• Data type• Topology• Congestion• Computer

processing

Page 21: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

• A seven layered model used as an educational tool to simplify network communications.

• Let’s look at the first four layers.

OSI MODEL

Page 22: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

• Layer 4 is the “hand shake” layer. This layer establishes the type of connection necessary to complete your internet request.

• If you are going to Skype, video chat or audio chat then your connection would be connectionless.

• If you are going to read articles, look at images, play music and videos your connection would connection oriented.

• TCP (transmission control protocol) is a connection oriented service.

• UDP (user datagram protocol) is a connectionless oriented service.

TRANSPORT LAYER

Page 23: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

Layer 3 is the network layer.• It provides the routing information of the data.• It handles IP addresses.

NETWORK LAYER

Computer: Can you get to www.google.com?

Router: Is that even on my network? Router: Uh, you’ll need an IP address for that website.

Page 24: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

Layer 2 is the data link layer.• It converts the logical data into electronic pulses.• It handles MAC addresses.

DATA LINK LAYER

PC says: User is asking for me to print.PC asks: Who’s the printer?Printer says: I am.PC asks for MAC address and printer replies 0B-5A-01-15-C1.PC says here is the print in bits.

Page 25: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

Layer 1 is the data link layer.• It is the physical link between devices on the network.• It is the coaxial, fiber, and utp media connections.

PHYSICAL LAYER

Page 26: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

CATEGORIES OF INTERNET SPEED

Page 27: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

The speed at which a user can retrieve data from the Internet

DOWNLOAD SPEED

Page 28: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

The speed at which a user can send data to a remote location on the Internet

UPLOAD SPEED

Page 29: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

The lag, or length of time, that occurs between each point during information transfer

LATENCY

Page 30: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

LINKING TO THE INTERNET

Page 31: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

To link to the Internet, the user needs to set up service with a company that has a permanent connection and that can provide temporary access to users

INTERNET SERVICE PROVIDER

I S P

Page 32: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

To connect to the Internet, a computer must have a unique identifier

INTERNET PROTOCOL ADDRESS

I P ADDRESS

Page 33: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

SECURITY RISKS

Page 34: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

A computer program that replicates itself. Often with malicious intent to destroy critical system files.

VIRUS

Page 35: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

A form of malware that uses the network to spread from host to host

WORM

Page 36: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

A standalone, malicious program that gives access from the infected computer to another computer. Often disguised as popular apps or download illegal copies.Sometimes key stroke loggers and unwanted advertisements will be present.

TROJAN HORSE

Page 37: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

• The word Botnet is derived from robot and network.• A collection of internet-connected programs

communicating with other similar programs in order to perform tasks. Botnets can be used to send spam or DDos (Distributed Denial of Service attacks).

• A Trojan horse may be the vehicle to breach the security on a computer. After infection the computer would then be organized into a network of bots that can be remotely managed.

BOTNET ATTACKS

Page 38: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

An intrusion to the network

Types:• Hacker• Phishing• Malware• Spyware• Adware

UNAUTHORIZED ACCESS

Page 39: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

A person who finds and exploits weaknesses of a computer

HACKER

Page 40: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

The act of masquerading as a trustworthy website or other entity to acquire user information

PHISHING

Page 41: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

Malicious software meant to gain access, disrupt computer operation, or gather sensitive information

MALWARE

Page 42: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

A type of malware that collects user information by tracking the habits of users

SPYWARE

Page 43: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

Advertising software that automatically generates advertisements

ADWARE

Page 44: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

Denial of Service (Dos) or Distributed Denial of Service (DDoS) is an attempt to make a machine or network resource unavailable to its intended users.

DENIAL OF SERVICE

Page 45: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

An attempt to use another’s identity to commit a crime

IDENTITY FRAUD

Page 46: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

• User awareness and education

• Anti-virus software• Firewalls• Passwords• Authentication

PREVENTION METHODS

Page 47: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

User awareness and education• User should remain educated about

computer risks.• Internet resources• Public news networks

USER AWARENESS

Page 48: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

• Antivirus software is an application used to prevent infection from risks.

• Commonly, antivirus software updates at regular intervals to guard against newly-created risks.

ANTIVIRUS SOFTWARE

Page 49: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

• A firewall is a physical device or application designed to deny incoming or outgoing traffic on a network.

FIREWALLS

Page 50: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

• A string of characters that allows access to a computer, interface or system.

• Passwords should be complex, including letters, numbers, and/or special characters.

• Passwords should be kept confidential.• Passwords should be changed regularly and not be

used repeatedly for other applications.

• An alternative that is strongly recommended is to use a passphrase.

PASSWORDS

Page 51: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

PASSWORDS AND PHRASES

Page 52: N ETWORK S YSTEMS 3.02 U NDERSTAND NETWORK MANAGEMENT

• The process of verifying that “you are who you say you are”.

• Two-step verification or authentication is available for some services. It adds a section check to make sure of the user’s identity.

• A bank card and a PIN number is a two-step verification system.

AUTHENTICATION