Detailed Networking Notes
Introduction to Network Administration
Network administration involves the management, operation, and maintenance of
computer networks.
It ensures that the network infrastructure is reliable, secure, and performs optimally.
Administrators are responsible for configuring network devices, managing IP addresses,
monitoring traffic, troubleshooting issues,
and implementing security measures to safeguard the network from attacks and
vulnerabilities.
Network Design and Setup
This process involves creating a structured layout of a network that ensures efficiency and
scalability.
It includes planning Local Area Networks (LANs), Wide Area Networks (WANs), and Virtual
LANs (VLANs).
Key steps include: designing layered LAN architecture (access, distribution, and core
layers), implementing redundant switches,
defining IP addressing schemes, and ensuring secure configurations such as port security
and VLAN segmentation.
Proper network design is critical for reducing downtime and improving performance.
Network Maintenance
Network maintenance refers to the continuous process of updating, upgrading, and
repairing the network to keep it functional.
Tasks include software and firmware updates, replacing faulty hardware, monitoring
bandwidth usage, and securing against vulnerabilities.
Regular maintenance ensures minimal downtime, enhances system reliability, and provides
smooth communication across the organization.
Network Monitoring
Monitoring ensures that administrators can track the performance, availability, and security
of the network.
Tools are used to measure uptime, bandwidth utilization, CPU usage of devices, and detect
unauthorized access attempts.
Network monitoring tools also help in analyzing logs, generating performance reports, and
setting alerts for unusual activities.
It is essential for early detection of issues to minimize disruptions.
Network Security
Network security ensures that data and resources are protected against cyber threats such
as malware, unauthorized access, and denial of service (DoS) attacks.
Security issues include authentication (user identity verification), confidentiality (privacy of
data), integrity (protection from modification),
and resilience against DoS. Security policies, firewalls, intrusion detection/prevention
systems, encryption, and physical security measures
are crucial components of protecting a network.
Network Vulnerabilities
These are weaknesses within the network that attackers can exploit.
They can be technological vulnerabilities (unpatched software), configuration weaknesses
(default passwords, unencrypted data),
policy weaknesses (lack of ICT policies), implementation failures (low budgets, lack of
skilled staff), or complete absence of policies.
Understanding vulnerabilities helps administrators mitigate risks by applying best practices
in ICT security, backups, disaster recovery, and policy enforcement.
Threats
Threats are potential dangers that exploit vulnerabilities.
Types include physical threats (theft, vandalism), electrical threats (power fluctuations,
surges),
environmental threats (humidity, dust, heat), and maintenance threats (unauthorized
access during repairs).
Proper security measures, power management systems, and controlled access reduce these
risks.
Attacks
Attacks are deliberate attempts to gain unauthorized access or disrupt services.
Common attacks include:
- Man-in-the-Middle (intercepting communications),
- Malware (viruses, worms, Trojans),
- Trust Exploitation (using trusted clients to access servers),
- DoS (flooding resources to block legitimate access),
- Phishing (tricking users into revealing sensitive information),
- Password attacks (brute-force, dictionary guessing),
- DNS Spoofing (redirecting traffic by poisoning DNS cache).
Preventive measures include antivirus software, encryption, secure authentication, and
user awareness training.
Types of Security
Network security can be classified into:
1. Firewall Security: Regulates incoming and outgoing traffic to block unauthorized access.
2. Antimalware: Protects against malicious software.
3. SIEM (System Information and Event Management): Detects, analyzes, and responds to
threats.
4. Access Security: Restricts access to sensitive data.
5. Application Security: Protects software applications from vulnerabilities.
6. Physical Security: Prevents unauthorized physical access and protects against disasters.
Network Administration Aspects
The key aspects of network administration are:
1. Setting up the infrastructure (designing LAN architecture, switches, VLANs, and routing).
2. Provision of services (using servers for DHCP, DNS, email, virtualization, and remote
access).
3. Monitoring and security (using tools for intrusion detection, logs, and bandwidth
control).
4. Maintenance (regular updates, backups, and troubleshooting).