BIT 3204 Network Management
BIT 3204 Network Management
Reference Books
WEEK 1 & 2
CHAPTER ONE: INTRODUCTION
Definitions- Network, Node, Segment, Backbone, Topology;
Network topologies; Bus, Star, Ring.
Transmission Media.
Network Protocols; OSI/TCPIP.
WEEK 3
CHAPTER TWO: NETWORK PLANNING
Gathering user requirements
Conducting site survey
Network design principles.
Assignment 1 : Develop a design for simple office network
ii
WEEK 4
CHAPTER THREE: NETWORK H/W AND SOFTWARE
Routers and Switches.
Network Servers and Clients
Network Operating Systems.
WEEK 5 & 6
CHAPTER FOUR : ACQUIRING NETWORK RESOURCES
Procurement vs Outsourcing Options
Request for proposals
Acquisition process
WEEK 7 & 8
CHAPTER FIVE: CONFIGURING NETWORK DEVICES
LAN Addressing
LAN Hardware Installation
Configuring LAN
Testing and troubleshooting a LAN
Connecting to the internet
WEEK 9 &10
WEEK 11
CHAPTER SEVEN: TROUBLESHOOTING NETWORK PROBLEMS
Diagnostic tools
Network management software
WEEK 12
CHAPTER EIGHT: DISASTER RECOVERY
Risk assessment
Risk mitigation Strategies
Data backup and recovery techniques
Security
Diagnostic tools
User management
ii
i
TABLE OF CONTENTS
i
v
5.1 Introduction ................................................................................................................................................ 42
5.2 LAN network address .................................................................................................................................. 42
5.8 The LAN hardware ..................................................................................................................................... 46
5.10 Configuring the LAN Software ................................................................................................................. 47
5.11 Testing the LAN ........................................................................................................................................ 47
5.12 Troubleshooting the LAN .......................................................................................................................... 50
5.13 Connecting to the Internet ........................................................................................................................ 51
Routing ............................................................................................................................................................. 52
Proxy servers .................................................................................................................................................... 52
IP Masquerading (NAT) ................................................................................................................................... 53
v
CHAPTER ONE: INTRODUCTION
Learning Objectives
1.0 Introduction
Computer networks today drive commerce and industry. Billions of shillings are generated
annually as a result of computer networks and related technologies. In this chapter we explore
some of the basics of computers networks including key definitions, topologies, network
models and transmission media.
Segment - Any portion of a network that is separated, by a switch, bridge or router, from
other parts of the network.
Backbone - The main cabling of a network that all of the segments connect to. Typically, the
backbone is capable of carrying more information than the individual segments. For example,
1
each segment may have a transfer rate of 10 Mbps (megabits per second: 1 million bits a
second), while the backbone may operate at 100 Mbps.
Topology - The way that each node is physically connected to the network.
2
1.2.2 Physical Ring Topology
Similar to a bus network, rings have nodes daisy chained, but the end of the network in a ring
topology comes back around to the first node, creating a complete circuit. Each node takes a
turn sending and receiving information through the use of a token. The token along with any
data is sent from the first node to the second node which extracts the data addressed to it and
adds any data it wishes to send. Then second node passes the token and data to the third node,
etc. until it comes back around to the first node again. Only the node with the token is allowed
to send data . All other nodes must wait for the token to come to them.
3
Advantages
Easy to add devices as the network expands
One cable failure does not bring down the entire network (resilience)
Hub provides centralised management
Easy to find device and cable problems
Can be upgraded to faster speeds
Lots of support as it is the most used
Disadvantages
A star network requires more cable than a ring or bus network
Failure of the central hub can bring down the entire network
Costs are higher (installation and equipment) than for most bus networks
4
HUB
Modern Ethernet networks are Star Topologies (physically) but logically they are bus
topologies. The Hub is at the centre, and defines a Star Topology.
In any network, computers communicate by sending information across the media as a series
of signals. In a logical bus topology, the signals travel along the length of the cable in all
directions until they weaken enough so as not to be detectable or until they encounter a device
that absorbs them. This traveling across the medium is called signal propagation
When a computer has data to send, it addresses that data, breaks it into manageable chunks,
and sends it across the network as electronic signals
All computers on a logical bus receive them
Only the destination computer accepts the data
All users must share the available amount of transmission time, implying
network performance is reduced
Collisions are bound to occur since all nodes are sharing same bus.
Advantages
A single node failure does not bring the network down
Most widely implemented topology
Network can be added to or changed without affecting other stations
Disadvantages
Collisions can occur easily
Only one device can access the network media at a time
5
Multiple Access Unit(MAU)
Data in a logical ring topology travels from one computer to the next computer until the data
reaches its destination. Token passing is one method for sending data around a ring
Token is a small packet which passes around the ring to each computer in turn.
If a computer (sender) has packets to send, it modifies the token, adds address and data, and
sends it around the ring. The receiver returns an acknowledgement packet to the sender.
Upon receiving the acknowledgement packet, the sender releases the tokens and sends it
around the ring for another sender to use.
Logical ring can be implemented on a physical star. Modern logical ring topologies use
“smart hubs” that recognize a computer’s failure and remove the computer from the ring
automatically. One advantage of the ring topology lies in its capability to share network
resources fairly.
Advantages
The amount of data that can be carried in a single message is greater than on a
logical bus.
There are no collisions.
Disadvantages
A broken ring will stop all transmissions.
A device must wait for an empty token to be able to transmit.
6
1.2.6 Switching
A switch takes a signal coming from a device connected and builds a circuit on the fly to
forward the signal to the intended destination computer
Superior to other logical topologies because unlike bus and ring, multiple computers can
communicate simultaneously without affecting each other. Switching is the dominant logical
topology in LAN design.
Twisted pair is two insulated copper wires that are twisted around each other to minimize
interference and noise from other wires. Based on the presence of individual shield and
overall (outer) shield, there are three types of twisted pair, i.e. UTP, STP, and ScTP.
Individual shield encloses a single twisted pair, while outer shield encloses all twisted pairs in
a cable. A shield is a protective sheath that is made from conductive material (metal) and
functions to protect the twisted pair from external interference. An insulator is made from
non-conductive material, such as plastic.
UTP (Unshielded Twisted Pair) is a cable containing several twisted pairs that is only
insulated but not shielded. UTP is the most widely used cable in telephone and computer
networks because it is relatively cheaper than other cables and performs well in normal
electrical environment such as inside an office or a house.
7
Coaxial cable contains a solid or stranded wire in the core that is insulated with a dielectric
layer, then protected with a solid or braided metallic shield, and covered with an outer
insulator. Electromagnetic wave propagation in a coaxial cable is confined within the space
between the core and the outer conductors. The structure of a coaxial cable makes it less
susceptible to interference, noise, and crosstalk than the twisted pair cable.
Coaxial Cable
1.3.2 Glass or plastic - Uses optical technology to transmit data using light waves e.g. fiber
optics
Fiber-optic cable or optical fiber provides a medium for signals using light rather than
electricity. Light waves are immune to electromagnetic interference and crosstalk. Optical
fiber can be used for much longer distances before the signal must be amplified. Data
transmission using optical fiber is many times faster than with electrical methods.
8
Microwave transmission
The optimum frequency range for satellite transmission is in the range 1 to 10 GHz.
Below 1 GHz, there is significant noise from natural sources, atmospheric noise, and noise
from electronic devices. Above 10 GHz, the signal is attenuated by atmospheric absorption.
9
Satellite Transmission
For example- if we had a token ring network and an extended star network, we wouldn’t need
to create an entirely different network software build for each one. Instead, we can just edit
the network layer, called the Network Access Layer, to allow compatibility. Not only does
1
0
this benefit manufacturers, but it greatly aids networking students in education. The TCP/IP
suite is divided into four layers.
Network Access Layer – The Network Access Layer is fairly self explanatory- it interfaces
with the physical network. It formats data and addresses data for subnets, based on physical
hardware addresses. More importantly, it provides error control for data delivered on the
physical network.
Internet Layer – The Internet Layer provides logical addressing. More specifically, the
internet layer relates physical addresses from the network access layer to logical addresses.
This can be an IP address, for instance. This is vital for passing along information to subnets
that aren’t on the same network as other parts of the network. This layer also provides routing
that may reduce traffic, and supports delivery across an internetwork. (An internetwork is
simply a greater network of LANs, perhaps a large company or organization.)
Transport Layer – The Transport Layer provides flow control, error control, and serves as
an interface for network applications. An example of the transport layer would be
Transmission Control Protocol (TCP) - a protocol suite that is connection-oriented. We may
also use UDP- a connectionless means of transporting data.
Application Layer – Lastly, we have the Application Layer. We use this layer for
troubleshooting, file transfer, internet activities, and a slew of other activities. This layer
interacts with many types of applications, such as a database manager, email program, or
Telnet.
1
1
OSI Model for short. The OSI Model describes how data flows from one computer to another
computer in a network.
Physical Layer – They Physical Layer converts data into streams of electric or analog pulses-
commonly referred to as “1’s and 0’s.” Data is broke down into simple electric pulses, and
rebuilt at the receiving end.
Data Link Layer – The Data Link layer provides an interface with the network adapter, and
can also perform basic error checking. It also maintains logical links for subnets, so that
subnets can communicate with other parts of the network without problem.
Network Layer – Much like the Transport Layer of the TCP/IP model, the Network Layer
simply supports logical addressing and routing. The IP protocol operates on the Network
Layer.
Transport Layer – Since we left out the error and flow control in the Network Layer, we
introduce it into the Transport Layer. The Transport Layer is responsible for keeping a
reliable end-to-end connection for the network.
Session Layer – The Session Layer establishes sessions between applications on a network.
This may be useful for network monitoring, using a login system, and reporting. The Session
Layer is actually not used a great deal over networks, although it does still serve good use in
streaming video and audio, or web conferencing.
Presentation Layer – The Presentation Layer translates data into a standard format, while
also being able to provide encryption and data compression. Encryption or data compression
does not have to be done at the Presentation Layer, although it is commonly performed in this
layer.
Application Layer – The Application Layer provides a network interface for applications and
supports network applications. This is where many protocols such as FTP, SMTP, POP3, and
many others operate. Telnet can be used at this layer to send a ping request- if it is successful,
it means that each layer of the OSI model should be functioning properly.
1
2
Review Questions
1. Define a the following terms:
i. Protocol
ii. Network
iii. Physical Topology
iv. Logical Topology
2. Differentiate between TCP/IP and OSI protocols and give the benefits of each.
3. Describe the biggest limitation of bus topology.
4. There are two main categories of transmission media, guided and unguided. Give
an example of each type. Why would an organization prefer unguided media?
5. Outline three factors to consider before choosing a network topology
6. Give one advantage and one disadvantage of the following topologies:
i. Ring topology
ii. Star topology
iii. Bus top0logy
1
3
CHAPTER TWO: NETWORK PLANNING
Learning Objectives
2.0 Introduction
This chapter is about planning for a network, collecting and conducting a needs assessment
and the factors to consider when conducting a network design. It will also focus on naming of
hosts in a network which also forms a fundamental aspect of planning.
1
4
Cost restrictions – using hub instead of switch
Difficulty to run cables – consider wireless ?
1
5
Create an up-to-date roadmap of all nodes along with model numbers, serial
numbers and any address information such as IP or Ethernet addresses.
Collect information on operational protocols used throughout the system.
List all network applications, including the number, type and utilization level.
Create a fairly extensive list of statistics to help meet your goals. These statistics
can include average network utilization, peak network utilization, average frame
size, peak frame size, average frames per second, peak frames per second, total
network collisions, network collisions per second, total runts, total jabbers, total
CRC errors, and nodes with highest percentage of utilization.
1
6
Analysis
Management Design
Simulation/
Prototyping
Monitoring
Implementation
A network cannot very well provide effective solutions to problems that have not been clearly
defined in objective terms. To attempt to implement networks before everyone agrees to (buy-
in) the exact nature of the problem to be solved is somewhat akin to hitting a moving target.
The network will never satisfy all constituencies’ needs because no one agreed what those
needs were in the first place. All network development efforts start with a problem as
perceived by someone, be they management or end-users. At some point, management agrees
that a problem exists that is worth expending resources to at least investigate. The
responsibility for conducting the investigation may be given to in-house personnel or to an
outside consultant or facilitator.
Interviews with users and technical personnel
Understand business and technical goals for a new or enhanced system
Characterize the existing network: logical and physical topology, and network
performance
Analyze current and future network traffic, including traffic flow and load,
protocol behavior, and QoS requirements
1
7
2.7.2 Develop the logical design
An IP network have two very important resources, its IP addresses and the corresponding
naming structure within the network. To provide effective communication between hosts or
stations in a network, each station must maintain a unique identity. In an IP network this is
achieved by the IP address. The distribution and management of these addresses is an
important consideration in an IP network design. IP addresses are inherently not easy to
remember. People find it much easier to remember names and have these names related to
individual machines connected to a network. Even applications rarely refer to hosts by their
binary identifiers, in general they use ASCII strings such as [email protected]. These names must
be translated to IP addresses because the network does not utilize identifiers based on ASCII
strings. The management of these names and the translation mechanism used must also be
considered by the IP network designer.
1
8
Network Layout Diagram
1
9
allows only department D to access its data. At the network level, requirements such as these
are usually done through filtering at the router so as to direct traffic flow in the correct
manner. Business and security needs determine how information flows in a network and the
right tool has to be chosen to carry this out.
Types of Application
The types of application deployed determines the bandwidth required. While a text-based
transaction may require a few kbps of bandwidth, a multimedia transaction may suck in
hundreds of megabytes of data.
The first part of the address, the network number, is assigned by a regional
authority and will vary in its length depending on the class of addresses to which it belongs.
The network number part of the IP address is used by the IP protocol to route IP datagrams
throughout TCP/IP networks. These networks may be within your enterprise and under your
control, in which case, to some extent, you are free to allocate this part of the address yourself
without prior reference to the Internet authority, but if you do so, you are encouraged to use
the private IP addresses that have been reserved by the Internet Assigned Number Authority
(IANA) for that purpose.
However if your routing may take you into networks outside of your control, using for
example, the worldwide services, it is imperative that you obtain a unique IP
address from your regional Internet address authority or Internet Service Provider(ISP).
The second part of the IP address, the host number, is used to identify the individual host
within a network. This portion of the address is assigned locally within a network by the
authority that controls that network. The length of this number is, as mentioned before,
dependent on the class of the IP address being used and also on whether subnetting is in use.
(subnetting is beyond the scope of this course).
The 32 bits that make up the IP address are usually written as four 8-bit decimal values
concatenated with dots (periods). This representation is commonly referred to as a dotted
decimal notation. An example of this is the IP address
172.16.3.14. In this example the 172.16 is the network number and the 3.14 is the
2
0
host number. The split into network number and host number is determined by
the class of the IP address.
Class A network :Addresses have the first bit set to 0. The next 7 bits are used for the
network number. This gives a possibility of 128 networks (27). However, it should be noted
that there are two cases, the all bits 0 number and the all bits 1 number, which have special
significance in classes A, B and C.
The remaining 24 bits of a Class A address are used for the host number. Once again, the two
special cases apply to the host number part of an IP address. Each Class A network can
therefore have a total of 16,777,214 hosts (224 -2). Class A addresses are assigned only to
networks with very large numbers of hosts (historically, large corporations). An example is
the 9.0.0.0 network, which is assigned to IBM.
Class B network: A Class B address is more suited to medium-sized networks. The first two
bits of the address are predefined as 10. The next 14 bits are used for the network number and
the remaining 16 bits identify the host number. This gives a possibility of 16,382 networks
each containing up to 65,534 hosts.
Class C network: The Class C address offers a maximum of 254 hosts per network and is
therefore suited to smaller networks. However, with the first three bits of the address
predefined to 110, the next 21 bits provide for a maximum of 2,097,150 such networks.
The remaining classes of address, D and E, are reserved classes and have a special meaning.
Class E addresses are reserved for future use while Class D
addresses are used to address groups of hosts in a limited area. This function is
known as multicasting.
Review Questions
1. Describe the process of gathering user requirements for a small network.
2. Why is it important to consider future expansion when planning for a network?
3. Briefly describe the five network classes.
4. Differentiate between a public and a private IP address
5. How many hosts can the following network have : 172.16.0.0
2
1
1. FOSS Network Infrastructure and Security/Network Plannning, Wikibook
(http://en.wikibooks.org/wiki/FOSS_Network_Infrastructure_and_Security/Network_
Planning)
2. Hansen, (1992), “Manual for the Preparation of Industrial Feasibility Studies”,
UNIDO
3. Chandra Prasanna, (2002), “Projects: Planning, Analysis Financing Implementation
and Review”, 5th Ed, Tata McGraw-Hill New Delhi
Learning Objectives
2
2
iii. Explain the network host naming procedures such as IP addresses and host names
iv. Describe the various network classifications
v. Explain the role of software in supporting networking functions.
vi. Explain the main functions of network operating systems
3.0 Introduction
A typical computer network is divided into two main parts, hardware and software. Hardware
refers to the physical tangible parts of the network such as hosts, routers, transmission media
etc whereas software are programs and protocols that aids in data transfer between hosts. This
chapter covers these two main parts of networks in detail.
A network component's functions are not necessarily handled by a specific device. Many
devices combine several networking functions. For example: a router could have a built-in
switch, a residential gateway that includes a broadband modem, etc. So, be sure to check the
product specification before buying to avoid duplication. You must also check interfaces that
are supported by a product. They must be compatible with the ports available in your
computers or other devices.
2
3
Network Adapter Cards
Built-in network adapter is integrated with a computer motherboard. Internal network adapter
is installed inside a computer on an expansion slot. It is often called NIC (network interface
card) usually inserted into a PCI slot in a PC or a mini PCI slot in a notebook.
3.1.2 Modem
Modem means modulator-demodulator. At the sending end, a modem modulates a carrier
with the data (baseband signal) to prepare it for transmission. At the receiving end, the
modulated carrier is demodulated (i.e. converted back to the original shape) and the data is
extracted. A modem also performs other functions, such as digital-to-analog/analog-to-digital
conversion, compression/decompression, error correction, and encryption/decryption.
3.1.3 Repeater
Repeater receives signal from a transmitter, amplifies it, and retransmits it to a receiver. A
repeater is put in a network to extend the network to a longer distance or a greater area. There
can be more than one repeater between a transmitter and a receiver, however the number of
repeaters is not unlimited, because additional repeaters may introduce more interference or
noise.
2
4
Repeater
3.1.4 Hub
Hub is the central connection point in a network. Hub is used in a network that uses star
topology. A sending computer transmits its signal to a hub, the hub then retransmits the signal
to all other computers. A passive hub functions as a relay station that receives and retransmits
signal. An active hub functions as a repeater that regenerates signal before retransmitting.
Hub
Using a hub, the network bandwidth (capacity) is shared by all available computers, therefore
each computer only uses a portion of bandwidth. That's why hub is mostly used in small
networks where there are only a few connected devices or computers. However, hub is not
required if there are only two computers in a network. In that case, a direct connection using
cable or wireless link can be used to connect both computers.
3.1.5 Switch
Like hub, switch works as the central connection point in a network. However when a switch
receives a packet from a sending computer, it examines the destination address (i.e. MAC
address of the destination computer) from the packet header and retransmits the packet to the
destination computer only. That's possible because a switch maintains a table that maps all its
ports with all connected devices' MAC addresses.
2
5
Switch
3.1.7 Router
Router functions to forward packets across different networks. Router maintains a routing
table. The routing table contains IP addresses of other networks routers. In a static router the
routing table is configured manually, while a dynamic router can communicate with other
routers and configure the routing table according to information it receives from other routers.
Router
2
7
Residential Gateway
With a residential gateway, you don't have to manually set an IP address for each computer in
your network because a residential gateway usually has DHCP server. Using DHCP, IP
address for each computer is assigned dynamically by the residential gateway.
A residential gateway also keeps your computers anonymous on the Internet because it
translates the IP address of each computer to an IP address assigned by the ISP. This function
is called Network Address Translation (NAT).
Besides, a residential gateway protects your home network from intruders that try to gain
access through certain applications in your computers because it has built-in firewall.
Residential gateway is also known as broadband router or Internet gateway device (IGD).
2
8
3.1.9 Gateway
Gateway
The following table summarizes network components along with their functions and the
corresponding layers in the OSI Model:
2
9
segments to filter traffic.
A network operating system(NOS) is an operating system that has built-in support for
networking. Any modern Operating System contains built-in software designed to simplify
networking of a computer.
Typical NOS software includes an implementation of TCP/IP protocol stack and related
utility programs like ping and traceroute. This includes the necessary device drivers and other
software to automatically enable a device's Ethernet interface. Mobile devices also normally
provide the programs needed to enable Wi-Fi, Bluetooth, or other wireless connectivity.
3
0
The early versions of Microsoft Windows did not provide any computer networking support.
Microsoft added basic networking capability into its operating system starting with Windows
95 and Windows for Workgroups. Microsoft also introduced its Internet Connection Sharing
(ICS) feature in Windows 98 Second Edition (Win98 SE). Contrast that with Unix, which was
designed from the beginning with networking capability.
Nearly any consumer O/S today qualifies as a network operating system due to the popularity
of the Internet.
Network operating systems (NOSs) distribute their functions over a number of networked
computers they add functions that allow access to shared resources by a number of users
concurrently.
Client systems also contain specialized software that allows them to request shared resources
that are controlled by server systems responding to a client request. The NOS enhances the
reach of the client PC by making remote services available as extensions of the local native
operating system.
NOSs also support multiple user accounts at the same time and enables concurrent access to
shared resources by multiple clients. A NOS server is a multitasking system.
3
1
3.2.1 Choosing a NOS
The main features to consider when selecting a NOS include:
Performance
Security
Scalability
Robustness/fault tolerance
Windows NOS
Windows Server 2008 R2 is a network operating system from Microsoft, which can be
deployed in medium to large scale organizations in order to allow administrators to centrally
manage the entire network setup right from a single location. Just like its predecessors
(server 2000 and server 2003) it comes in two versions, client operating system version and
server operating system(NOS) version.
The main difference between a client operating system, such as Microsoft Windows 8,
Microsoft Windows 7, etc. and a server operating system such as Microsoft Windows Server
2008 RTM/R2, Windows Server 2003 and Windows 2000 Server is that the network
operating system (NOS) has some additional server specific features integrated in it. These
additional features include:
3
2
Although Windows Server 2008 is a network operating system, it is initially installed just as
a normal client operating system, i.e. without any additional server oriented services or
features installed in it. In order to make the installed network operating system work as a
typical server, systems administrators must install the server services and/or features
according to the role that they want the computer to play in the network.
The four main versions of Windows Server 2008 are different in the versions for 32 bit and 64
bit systems.
Windows Server 2008 Standard supports up to 4 GB RAM in the 32-bit version and 32 GB
RAM in the 64-bit version. The operating system supports up to 4 processors. 12 server roles
are complete supported, 4 partial and Active Directory Federation Services (ADFS) are not
supported.
Windows Server 2008 Enterprise supports up to 64 GB RAM in the 32-bit version and 2 TB
RAM in the 64-bit version. The operating system supports up to 8 processors. As field of
application this server platform is recommended for the securing of business critical
applications in Clusters. All server roles are supported.
Windows Server 2008 Datacenter supports up to 64 GB RAM in the 32-bit version and 2
TB RAM in the 64-bit version. The operating system supports depending on hardware up to
64 processors. As field of application this server platform is recommended for Computer
Centres and Clusters. The replace of working memory and processors is possible without
shutdown of the running operating system. All server roles are supported.
Windows Web Server 2008 supports up to 4 GB RAM in the 32-bit version and 32 GB
RAM in the 64-bit version. As field of application this server platform is recommended for
Web Server and supports only this server role.
3
3
Unix/Linux
Linux is an operating system similar to UNIX. It runs on many different computers and was
first released in 1991. Linux is portable, which means versions can be found running on name
brand or clone PCs. It offers many features adopted from other versions of UNIX.
The UNIX NOS was developed in 1969, and it has evolved into many varieties.
The source code is opened, that is, available at no cost to anyone who wants to modify it. It is
written in C programming language so businesses, academic institutions, and even individuals
can develop their own versions. There are hundreds of different versions of UNIX. Linux is
sometimes referred to as "UNIX Lite", and it is designed to run on Intel-compatible PCs.
Linux brings the advantages of UNIX to home and small business computers.
• Linux Mandrake
• Debian GNU/Linux
• Corel Linux
• Turbo Linux
• Ubuntu
A popular use of a Linux system is a web server. Web server software uses Hypertext
Transfer Protocol (HTTP) to deliver files to users that request them, using a web browser
from their workstation.
A Mail Server is a system that is configured with the proper programs and services that enable
handling the exchange of e-mail sent from one client to another.
3
4
Review Questions
3
5
CHAPTER FOUR: PROCURING NETWORK RESOURCES
Learning Objectives
4.1 Introduction
The term ‘acquisition’ refers to all the stages from buying, introducing, applying, adopting,
adapting, localizing, and developing through to diffusion. The set of processes for the build,
lease, or buy decision must be identical for every instance or business opportunity that arises.
The processes determine the strategic value and potential savings of the proposed acquisition,
as well as factors like business transformation versus drive for competitive advantage.
Prior to the acquisition process, the detail requirements of the process should have already
been identified clearly. More importantly, the business objectives should be identified for the
3
6
solution being sought and the management decision whether building, leasing, or buying the
resources should consider a value-versus-risk matrix to determine which options can be
applied. Both IT auditors and corporate management should evaluate offerings over the long
term and compare the "trickling" investment over time to the one-time cost of buying and
implementing a network. Moreover, this technology acquisition process requires an extensive
evaluation considering the system requirements, feasibility analysis, and risk management
assessment.
The acquisition process should involve the identification and analysis of alternative solutions
that are each compared with the established business requirements. The decision making to
acquire a device primarily consists of the following stages:
One of the most essential assessments in decision making process is identifying the business
objective after first knowing the problems being solved. The management should primarily
identify the business processes involved in the organization. The first phase of the acquisition
process should align the business process with the company objectives and the business
plan. Note that specific process may need to be prioritized to fully obtain the benefits of the
implementation. Moreover, each process should be carefully analyzed to ensure that it will
have the certain functionality to meet the requirements of the business process and the users,
as well as the benefits which can be justified with its cost.
Analyzing alternatives
There are several options in procuring networking solutions. Some available alternatives are:
(1)Buying all equipment from a vendor and installing on your own (2) Leasing equipment
from a service provider (ISP) or lease through utility computing (contracted development), (3)
Outsourcing network services from another company etc.
While an organization is in the phase of deciding which alternative being selected, the
management should carefully examine not only the advantages and disadvantages of each
procuring option, but more importantly, the option must be best-fit with the organization
business plan.
3
7
Conducting a feasibility analysis
Upon completion of the series of feasibility analyses, the risk analysis review most likely will
be conducted. Risk analysis evaluate the security of proposed system, potential threats,
3
8
vulnerabilities, impacts, as well as the feasibility of other controls can be used to minimize the
identified threats.
Selection Procedure
Selection procedure is the process of identifying the best match between the available options
and the identified requirements. In this process, the company requests for a proposal from
prospective providers, evaluates the proposal, and selects the best available alternative. There
are various ways to solicit responses from providers. Some of the common methods comprise
request for information (RFI), request for bid (RFB), and request for proposal (RFP). An RFI
is used to seek information from vendors for a specific intention. RFI should act as a tool for
determining the alternatives or associated alternatives for meeting the organization’s needs.
An RFB is designed to procure specific items or services and used where either multiple
vendors are equally competent of meeting all of the technical and functional specifications or
only one provider can meet them. Furthermore, an RFP specifies the minimal acceptable
requirements, including functional, technical, and contractual aspects. This document offers
flexibility to respondents to further define the requested requirements. RFPs can be a lead to a
purchase or continued negotiation.
All of these processes should be structurally proceeded to ensure the process would be
completed neatly in a timely fashion. If done properly, this process turns out to be a
purchasing decision for the selected application. Note that the entire process must be
documented in a written letter before moving to the next step. This is an important issue to
avoid a bid protest that may be filled from any other potential vendors. Management, IT
auditor and also legal counsel must review every point in detail before the proposal evaluation
process begins.
Proposal evaluation is a crucial process in the acquisition since one of more key stakeholders
reviews submitted proposals using a list of objective selection criteria and decide the best
match between the product features and functionality with the identified requirements.
3
9
Negotiating a contract
Once the vendor is selected, then the company can move to the contract negotiation, in which
the company can specify the price of the job and the type of the support to be provided by the
vendor. The contract must describe the detailed specifications, all the included services
provided by the vendor, and other detail terms of the system. Contract is a legal document so
the company should involve the experienced staff in IT and legal matters. Since the contract
can be very tricky so these legal counsel should be involved from the beginning of selection
process.
Establishing a service level agreement (SLA) SLA is formal agreement regarding the
distribution of work between the organization and its vendor. Such agreement is created
according to a set of agreed-upon objective, quality tests, and some what-if situations.
Overall, SLA defines: (1) company and vendor responsibilities, (2) framework for designing
support services, (3) company privilege to have most of the control over their system.
Upon completion of the contract negotiation, an acceptance plan should be agreed by both the
company and the vendor so that the network can be ready to be installed. During this process,
the level of performance is also tested and user reactions are evaluated. After implementation
the company management may deal with organizational issues such as conversion strategies,
training, and resistant to change.
Review Questions
4
0
References and suggested further reading
4
1
CHAPTER FIVE: CONFIGURING NETWORK DEVICES
Learning Objectives
5.1 Introduction
Having acquired all the necessary hardware and software to setup a network, what remains is
installation and configuration so that you can start enjoying the benefits of networks. his
chapter takes you through the basics of installation, configuration and testing.
It also looks at various ways of connecting to the internet.
The first three octets of an IP address should be the same for all computers in the LAN. For
example, if a total of 128 hosts exist in a single LAN, the IP addresses could be assigned
starting with 192.168.1.x, where x represents a number in the range of 1 to 128. You could
create consecutive LANs within the same company in a similar manner consisting of up to
another 128 computers. Of course, you are not limited to 128 computers, as there are other
ranges of IP addresses that allow you to build even larger networks.
There are different classes of networks that determine the size and total possible unique IP
addresses of any given LAN. For example, a class A LAN can have over 16 million unique IP
4
2
addresses. A class B LAN can have over 65,000 unique IP addresses. The size of your LAN
depends on which reserved address range you use and the subnet mask(explained later)
associated with that range. (see Table below.).
For example, if you use addresses in the range of 192.168.1.0 to 192.168.1.128, the first
address (192.168.1.0) is reserved as the network address, and the last address (192.168.1.128)
is reserved as the broadcast address. Therefore, you only assign individual computers on the
LAN IP addresses in the range of 192.168.1.1 to 192.168.1.127:
4
3
5.5 Domain name
The domain name, or network name, is a unique name followed by a standard Internet
suffixes such as .com, .org, .mil, .net, etc. You can pretty much name your LAN anything if it
has a simple dial-up connection and your LAN is not a server providing some type of service
to other hosts directly. In addition, our sample network is considered private since it uses IP
addresses in the range of 192.168.1.x. Most importantly, the domain name of choice should
not be accessible from the Internet if the above constraints are strictly enforced. Lastly, to
obtain an "official" domain name you could register through InterNIC, Network Solutions or
Register.com.
5.6 Hostnames
Another important step in setting up a LAN is assigning a unique hostname to each computer
in the LAN. A hostname is simply a unique name that can be made up and is used to identify
a unique computer in the LAN. Also, the name should not contain any blank spaces or
punctuation. For example, the following are valid hostnames that could be assigned to each
computer in a LAN consisting of 5 hosts: hostname 1 - Simba; hostname 2 - Chui; hostname 3
- Duma; hostname 4 - Nyati; and hostname 5 - Ndume. Each of these hostnames conforms to
the requirement that no blank spaces or punctuation marks are present. Use short hostnames to
eliminate excessive typing, and choose a name that is easy to remember.
Table 2 summarizes what we have covered so far in this article. Every host in the LAN will
have the same network address, broadcast address, subnet mask, and domain name because
those addresses identify the network in its entirety. Each computer in the LAN will have a
hostname and IP address that uniquely identifies that particular host. The network address is
192.168.1.0, and the broadcast address is 192.168.1.128. Therefore, each host in the LAN
must have an IP address between 192.168.1.1 to 192.168.127.
Table 2. Sample IP addresses for a LAN with 127 or fewer interconnected computers
IP address Example Same/unique
4
4
Hostname Any valid name Unique to each host
There are two ways to assign IP addresses in a LAN. You can manually assign a static IP
address to each computer in the LAN, or you can use a special type of server that
automatically assigns a dynamic IP address to each computer as it logs into the network.
4
5
5.8 The LAN hardware
Also make sure that the hardware of choice is compatible with the operating system. This
hardware/software compatibility information is usually found in the Requirements section on
the back of the box of each product. Alternatively, you could ask a computer sales person
about hardware/software requirements. You can usually save money by purchasing LAN
cards as a package vs. purchasing them individually.
When choosing an Ethernet hub ensure that it contains at least as many ports as there are
computers that will participate in the LAN. It is always best to choose a hub with additional
ports to allow for expansion.
If you plan to use all of the computers in the LAN to access the Internet via a local Internet
Service Provider (ISP), the router/Ethernet combo is an ideal choice. The router/Ethernet unit
is normally configured using any computer that is connected to the LAN. Assuming that all
computers in the LAN will be running the Red Hat Linux operating system, a router will be
required that can be configured using a Linux configuration program such as LinuxConf.
Finally, choose network cables to allow for expansion. Typically, most Ethernet networks use
10BaseT cables with RJ45 jacks at each end. It's always a good idea to purchase cables that
are 1 or 2 times longer than the required length in case the structure (topology) of the LAN
changes in the future.
Find a convenient but safe location for the Ethernet hub, preferably a centralized location in
the same building or room along with the computers. Next, run the cable from the NIC in each
computer to the Ethernet hub ensuring all cables are out of the way of users who will need
physical access to each computer in the LAN. Moreover, make sure you follow all
instructions provided with the LAN hardware before starting up any of the computers that will
participate in the LAN.
If you are using a router to connect the LAN to the Internet or using a DHCP server, you will
need to do some configuration as required by the user's manual. Lastly, assuming all
computers are attached to the Ethernet hub via the NIC and a specific port on the hub, you can
now begin the software configuration process using your network operating system of choice.
How you configure the computers on the LAN will depend on whether the NOS was installed
before or after the LAN hardware. If you installed the LAN hardware before installing NOS
you will be prompted for network configuration during the NOS installation process.
However, if you installed the NOS after the LAN hardware, the NOS software will detect the
newly installed Ethernet card and initiate the configuration process automatically. Different
NOSs will have different procedures for configuring various network services:
DHCP
Active Directory
DNS
To test the completely configured LAN, make sure that the computers are able to
communicate with each other after the bootup process. We do this using “ping” command.
4
7
'Ping' (actually its full name is 'ICMP Echo request') is a simple command that may be issued
from the command line. Ping tells you if you can, or cannot, contact an IP address of another
PC. Ping sends a small message to another computer which causes the receiver to echo back
the same message (the message pings forward and backward). Ping is the simplest and most
useful diagnostic tool to become familiar with and well worth a few minutes experimentation.
To use Ping;
where xxx.xxx.xxx.xxx is the IP address that you want to check followed by ENTER.
You can also use a URL with a ping:
ping www.sitename.com
For this format to work the DNS service must be contactable and working.
4. If ping works (you have successfully sent a message to the remote computer and
received a response) you should get up to 4 replies of the form:
Where xxx.xxx.xxx.xxx is the IP address that is responding, yyms is the time (yy) in
milliseconds (ms) that the ping took and zz can be used to calculate the number of
routers that it passed through on its journey.
4
8
Another useful diagnostic tool is traceroute (tracert in windows) command. Traceroute is a command
which can show you the path a packet of information takes from your computer to one you
specify. It will list all the routers it passes through until it reaches its destination, or fails to
and is discarded. In addition to this, it will tell you how long each 'hop' from router to router
takes.
It then prints out an ordered list of the routers in the path that returned the ICMP message
In the following example, the packet must travel through two routers (157.54.48.1 and
11.1.0.67) to get to host 11.1.0.1. In this example, the default gateway is 157.54.48.1 and the
IP address of the router on the 11.1.0.0 network is at 11.1.0.67.
C:\>tracert 11.1.0.1
Tracing route to 11.1.0.1 over a maximum of 30 hops
1 2 ms 3 ms 2 ms 157.54.48.1
2 75 ms 83 ms 88 ms 11.1.0.67
3 73 ms 79 ms 93 ms 11.1.0.1
Trace complete.
Exercise : Try tracert google.com and see how many hops will be returned
4
9
Traceroute returns a “Request Timed out” message.
1 is the internet gateway on the network this traceroute was done from.
2 is the ISP the origin computer is connected to (xtra.co.nz)
3 is also in the xtra network
4 timed out
5 - 9 are all routers on the global-gateway.net.nz network
10 - 14 are all gnaps.net in the USA (a telecom supplier in the USA)
15 - 17 are on the nac network (Net Access Corporation, an ISP in the New York area)
18 is a router on the network mediacollege.com is hosted on
and finally, line 19 is the computer mediacollege.com is hosted on (sol.yourhost.co.nz)
To diagnose a network problem you start by verifying the connections from a known starting
point (your PC) then moving progressively further into the network until you find the
problem:
1. Always start with your own PC. Issue a ping to your own PC. If this fails restart
your PC and try the failing operation again.
2. Check with someone else in the office - if you are the only person having the
problem you have already isolated it to your PC or its wiring. Now you only have to
find it - in all cases it is not a remote network problem.
5
0
i. Restart your PC - 90% of all problems disappear with this one act.
ii. Check the link LEDs on your PC LAN card (if it has any).
iii. Check your cabling.
If your local PC is OK - someone else will have the same problem. Ping the local
router/default gateway. If this fails we may have a problem with the local LAN or the
router.
Find your router and Hub/Switch check the LED displays. If they are not normal
remove and immediately replace the power connection or switch the unit OFF then
ON.
Go back to your PC and retry to ping your local router and then repeat the failing
operation.
If your local router is OK - we can ping it and its LEDs are normal.
Issue a tracert command to a remote host such as www.yahoo.com. NOTE: always use
the -d option with this command and you can abandon it using CTRL+C when you see
two three consecutive rows of '*'.
Note the hop number of the first failure and contact your service provider is the host is
unreachable.
There are several ways to connect your computer to the internet. According to this manual,
there are at least 3:
GSM Modem - A GSM modem is a specialized type of modem which accepts a SIM card,
and operates over a subscription to a mobile operator, just like a mobile phone. From the
mobile operator perspective, a GSM modem looks just like a mobile phone.
5
1
When a GSM modem is connected to a computer, this allows the computer to use the GSM
modem to communicate over the mobile network. While these GSM modems are most
frequently used to provide mobile internet connectivity, many of them can also be used for
sending and receiving SMS and MMS messages.
Routing
This is what most businesses use. They get a block of static IP addresses from their ISP and
give each of their machines an IP address. In most cases, what we call the "gateway
computer" is in fact a router, a special hardware device which forwards the packets. Many
operatings systems (e.g. Unix, Windows NT/2K, OS/2 etc.) can route IP packets too. ) The
disadvantage of routing that it is more expensive because you will have to 'buy' static IP
addresses from your ISP. Not only that, the ISP will have to define a "route" to your own little
subnet on their systems. That means they'll have to do some work and thus they want to be
paid for it. It also means that intervention by your ISP is required, i.e. you can't do it all on
your own.
Proxy servers
Routing works great for businesses which are connected to the Internet 24 hours a day. But
what if you're not, and you still want to hook up a whole LAN to the Internet once in a while?
One solution would be if somehow a workstation computer could ask the gateway computer
to send and receive data on it's behalf. The software which does the trick is called a proxy
server. A well known example is WinGate. As far as the operating system is concerned, the
proxy server is a normal TCP/IP application. A workstation computer sends a request to the
gateway asking it to send data to the Internet. The data is sent using the gateway's IP address,
and any response comes back the same way. Any number of computers on your LAN can use
the connection in this way at the same time, as long as the data for separate requests is kept
separate. The gateway computer can be a 'normal' PC with a standard Internet connection.
There are several different way to do proxying: using the SOCKS protocol, socket relays and
application proxies.
An application proxy is a special TCP/IP program that knows about a particular application
protocol, and will accept requests using this protocol. A common example of this is the HTTP
proxy provided by many internet server providers. This program accepts HTTP requests from
clients using the HTTP protocol and converts them to requests to other HTTP servers.
5
2
IP Masquerading (NAT)
Some operating systems, most notably Linux, have the capability to perform IP routing with
the addition of changing the IP address in the packets on the fly, i.e. as the data is passed
through from the LAN to the Internet. When there is a mapping of multiple addresses on an
internal LAN to one particular IP address of the gateway, this is called IP Masquerading.
When the mapping is a bit broader (any IP address to any other IP address) the feature is
called Network Address Translation (NAT). NAT is a superset of IP Masquerading and is
often used in firewalls for security reasons. Note that ISPA also has a feature called NAT
(used for a different purpose).
Let's say in the following example that you use IPRoute software for NAT. IPRoute changes
the addresses in the packets it receives from the workstation machines into the address it is
using itself. For example, 2 workstation machines can each run a web browser. IPRoute
changes the addresses so the ISP thinks both web browsers are running on one and the same
machine! There's nothing strange with that, it has always been possible to run multiple web
browsers on one machine.
Running servers (say, webservers) on multiple workstation machines is a bit less transparent.
Most servers listen to a "well-known" port number. For a webserver this is port 80. But only 1
server can listen to a port at the same time. That means that the gateway machine can remap a
port to only one workstation machine. So, if you want to run more than one web server on
your internal network which must all be reachable from the outside, there is a problem.
Fortunately, there is also a solution. Let's say you have web servers on each port 80 of the
workstation machines 192.168.0.2, 192.168.0.3 and 192.168.0.4. You can remap port 80 on
the gateway machine to port 80 on 192.168.0.2, port 81 to port 80 on 192.168.0.3 and port 82
to port 80 on 192.168.0.4. People on the outside will have to specify URLs with "non-
standard" ports for the last two workstation machines, say http://www.example.com:81/ and
http://www.example.com:82/
5
3
Review Questions
1. Describe the structure of an IP- address.
2. You have been given an IP address 172.16.1.1 determine
i. Network address
ii. The range of addresses you can assign to individual hosts
iii. Broadcast address
iv. Network address
v. Subnet mask
5
4
6.1 Introduction
This chapter discusses security issues regarding TCP/IP networks and provides an overview
of solutions to resolve security problems before they can occur. The field of network security
in general and of TCP/IP security in particular is too wide to be dealt with in an all
encompassing way in this manual, so the focus of this chapter is on the most common security
exposures and measures to counteract them.
Because many, if not all, security solutions are based on cryptographic algorithms, we also
provide a brief overview of this topic for the better understanding of concepts presented
throughout this chapter.
Wire tapping: listening a link to get access to cleartext data and passwords
Impersonation: to get unauthorized access to data or to create unauthorized e-mails,
orders, etc.
Denial-of-service: to render network resources non-functional
Replay of messages: to get access to and change information in transit
Guessing of passwords: to get access to information and services that would
normally be denied (dictionary attack)
Guessing of keys: to get access to encrypted data and passwords (brute-force attack,
chosen ciphertext attack, chosen plaintext attack)
Viruses, trojan horses and logic bombs: to destroy data
5
5
Though these attacks are not exclusively specific to TCP/IP networks, they should be
considered potential threats to anyone who is going to base his/her network on TCP/IP, which
is what the majority of enterprises, organizations and small businesses around the world are
doing today. Hackers (more precisely, crackers) do likewise and hence find easy prey.
How to protect against viruses, Restrict access to outside IBM/Norton AntiVirus, etc.
trojan horses, logic bombs, etc.? sources. Run antivirus Content Technologies'
software MIMESweeper and
5
7
on every server and WebSweeper, etc. Finjan
workstation. Run Surfingate, etc.
content-screening software
on
your gateways for application
data (mail, files, Web pages,
etc.) and mobile code (Java,
ActiveX, etc.). Update that
software frequently.
How to prevent the improper Use a multi-layer access Application security (DBMS,
use of services by otherwise control model based on Web servers, Lotus Notes,
properly authenticated users? ACLs. etc.).
Server file systems
(UNIX, NTFS, NetWare,
HPFS-386, etc.). System
security services (RACF, DCE,
UNIX, NT, etc.).
How to obtain information on Observe security directives http://www.cert.org
possible security exposures? by organizations such as
CERT and your hardware and
software vendors
How to make sure that only Use access control at link RADIUS (optionally using
those people, that you want dial establishment by virtue of Kerberos, RACF, etc.),
into your network? central authentication TACACS. Security
services, two-factor Dynamics'
authentication, etc. SecureID ACE/Server, etc.
How do you know that your Use extensive logging and Application/Service access
system has been broken into? examine logs frequently. Use logs
intrusion detection programs. (Lotus Notes, DB2/UDB,
Web
5
8
servers, etc.). System logs
(UNIX, Windows NT,
AS/400,
etc.). Firewall logs and
alerting
(IBM firewalls, etc.). Systems
management and alerting
(Tivoli, etc.)
How to prevent wire tappers Encrypt messages, typically SET, SSL, IPSec, Kerberos,
from reading messages? using a shared secret key. PPP
Secret keys offer a
tremendous performance
advantage over public/private
keys.)
5
9
Will passwords or encryption provide enough protection?
How much access do you want to allow to your systems from the Internet
and/or users outside your network (business partners, suppliers, corporate
affiliates, etc.)?
What action will you take if you discover a breach in your security?
Who in your organization will enforce and supervise this policy?
This list is short, and your policy will probably encompass a lot more before it is complete.
Perhaps the very first thing you need to assess is the depth of your paranoia. Any security
policy is based on how much you trust people, both inside and outside your organization. The
policy must, however, provide a balance between allowing your users reasonable access to the
information they require to do their jobs, and totally disallowing access to your information.
The point where this line is drawn will determine your policy.
6
0
the outside and is usually also kept apart from internal users as an additional layer of
protection.
Perimeter Network: This is the network where your public resources are located.
These include Web and FTP servers but also application gateways and systems that provide
specialized security functions, such as content inspection, virus protection and intrusion
detection. This part of the network is typically secured from the outside as well as the inside
to provide maximum isolation of the traffic in this network. This part of the network may also
contain internal users.
Access Network: This is the network, whether private, public or virtual, leased or
dial-up, that is used by the outside to access your network and its services and applications.
This network is typically secured to the outside only.
Review Questions
1. What is network security?
2. Describe three security compromises that can be performed on data.
3. Explain why it is necessary for an organization to have a network security policy.
4. Explain how a firewall works to enforce a security policy.
5. You are network administrator in an organization. How will you know that the
network has been broken into? What will you do?
6. How does a security plan differ from a security policy?
7. Why is it important to achieve buy-in from users, managers, and technical staff for
the security policy?
8. What are some methods for keeping hackers from viewing and changing router and
switch configuration information?
9. How can a network manager secure a wireless network?
6
1
3. TCP/IP Network Administration, Craig Hunt ; O'Reilly Media, Inc., 2010
4. Linux Network Administrator's Guide, Olaf Kirch & Terry Dawson 2nd
Edition[http://oreilly.com/catalog/linag2/book/]
5. Network Security, A practical Approach, Jan Harrington, Elsevier.
6
2
Because of the large variety of network configurations, operating systems, setup, etc... not all
of the above information may apply to your network or operating system. If your computer is
connected to a company or large network, or you are not the administrator of the network, it is
recommended that if you are unable to resolve your issues after following the below
recommendations that you contact the network administrator or company representative.
If, however, the card does not have any lights or has orange or red lights, it is
possible that either the card is bad, the card is not connected properly, or that the
card is not receiving a signal from the network.
If you are on a small or local network and have the capability of checking a hub or
switch, verify that the cables are properly connected and that the hub or switch has
power.
Verify that the network card is capable of pinging or seeing itself by using the ping
command. Windows / MS-DOS users ping the computer from a MS-DOS prompt.
Unix / Linux variant users ping the computer from the shell. To ping the card or
the localhost, type either ping 127.0.0.1 or ping localhost
If your computer network utilizes a firewall, ensure that all ports required are
open. If possible, close the firewall software program or disconnect the computer
from the firewall to ensure it is not causing the problem.
6
3
There exists a wide variety of software and hardware products that help network system
administrators manage a network. Network management covers a wide area, including:
Network Operations: keeping the network (and the services that the network provides) up
and running smoothly. It includes monitoring the network to spot problems as soon as
possible, ideally before users are affected.
Administration: deals with keeping track of resources in the network and how they are
assigned.
Maintenance: concerned with performing repairs and upgrades. Maintenance also involves
corrective and preventive measures to make the managed network run "better”.
Provisioning: is concerned with configuring resources in the network to support a given
service.
We Monitor
System & Services
o Available, reachable
Resources
o Expansion planning, maintain availability
Performance
o Round-trip-time, throughput
6
4
Changes and configurations
o Documentation, revision control, logging
We Keep Track of
Statistics
o For purposes of accounting and metering
Faults (Intrusion Detection)
o Detection of issues,
o Troubleshooting issues and tracking their history
Help Desks are a useful to critical component
7.4 Expectations
A network in operation needs to be monitored in order to:
Deliver projected SLAs (Service Level Agreements)
SLAs depend on policy
What does your management expect?
What do your users expect?
What do your customers expect?
What does the rest of the Internet expect?
Review Questions
1. What is the first thing you will do if you discover your computer is not connecting?
2. How will you know if your network interface card(NIC) is working?
3. What is network management? Why do networks need to be managed?
4. Describe the five functional areas of network management.
5. What is the relationship between SLAs and network management?
6
6
References and suggested further reading
6
7
Risk Management
Risk management is the process of identifying, assessing and reducing risk. There are many
tools and techniques available for managing organizational risks. There are even a number of
tools and techniques that focus on managing risks to information systems. This chapter
explores the issue of risk management with respect to information systems and seeks to
answer the following questions:
• What is risk with respect to information systems?
• Why is it important to understand risk?
• How is risk assessed?
• How is risk managed?
• What are some common risk assessment/management methodologies and tools?
6
8
assessment and risk management. It is often expedient to incorporate threat sources into
threats. The list below shows some (but not all) of the possible threats to information systems.
Vulnerability: A flaw or weakness in system security procedures, design, implementation, or
internal controls that could be exercised (accidentally triggered or intentionally exploited) and
result in a security breach or a violation of the system’s security policy. Notice that the
vulnerability can be a flaw or weakness in any aspect of the system.
Vulnerabilities are not merely flaws in the technical protections provided by the system.
Significant vulnerabilities are often contained in the standard operating procedures that
systems administrators perform, the process that the help desk uses to reset passwords or
inadequate log review. Another area where vulnerabilities may be identified is at the policy
level. For instance, a lack of a clearly defined security testing policy may be directly
responsible for the lack of vulnerability scanning.
Here are a few examples of vulnerabilities related to contingency planning/ disaster recovery:
6
9
8.4 Risk Assessment
Risk is assessed by identifying threats and vulnerabilities, then determining the likelihood and
impact for each risk. It’s easy, right? Unfortunately, risk assessment is a complex
undertaking,usually based on imperfect information. There are many methodologies aimed at
allowing risk assessment to be repeatable and give consistent results.
7
0
Typically, it is not cost-effective to perform a quantitative risk assessment for an IT system,
due to the relative difficulty of obtaining accurate and complete information. However, if the
information is deemed reliable, a qualitative risk assessment is an extremely powerful tool to
communicate risk to all level of management.
It is valuable to compile a list of threats that are present across the organization and use this
list as the basis for all risk management activities. As a major consideration of risk
management is to ensure consistency and repeatability, an organizational threat list is
invaluable.
7
1
8.4.4 Identifying Vulnerabilities
Vulnerabilities can be identified by numerous means. Different risk management schemes
offer different methodologies for identifying vulnerabilities. In general, start with commonly
available vulnerability lists or control areas. Then, working with the system owners or other
individuals with knowledge of the system or organization, start to identify the vulnerabilities
that apply to the system. Specific vulnerabilities can be found by reviewing vendor web sites
and public vulnerability archives.
If they exist, previous risk assessments and audit reports are the best place to start.
Additionally, while the following tools and techniques are typically used to evaluate the
effectiveness of controls, they can also be used to identify vulnerabilities:
Vulnerability Scanners – Software that can examine an operating system, network
application or code for known flaws by comparing the system (or system responses to
known stimuli) to a database of flaw signatures.
Penetration Testing – An attempt by human security analysts to exercise threats
against the system. This includes operational vulnerabilities, such as social
engineering
Audit of Operational and Management Controls – A thorough review of operational
and management controls by comparing the current documentation to best practices
(such as ISO 17799) and by comparing actual practices against current documented
processes.
It is invaluable to have a base list of vulnerabilities that are always considered during every
risk assessment in the organization. This practice ensures at least a minimum level of
consistency between risk assessments. Moreover, vulnerabilities discovered during past
assessments of the system should be included in all future assessments. Doing this allows
management to understand that past risk management activities have been effective.
7
3
8.4.9 How Is Risk Managed?
Recall that the purpose of assessing risk is to assist management in determining where to
direct resources. There are four basic strategies for managing risk: mitigation, transference,
acceptance and avoidance. Each will be discussed below.
For each risk in the risk assessment report, a risk management strategy must be devised that
reduces the risk to an acceptable level for an acceptable cost. For each risk management
strategy, the cost associated with the strategy and the basic steps for achieving the strategy
(known as the Plan Of Action & Milestones or POAM) must also be determined.
Mitigation is the most commonly considered risk management strategy. Mitigation involves
fixing the flaw or providing some type of compensatory control to reduce the likelihood or
impact associated with the flaw. A common mitigation for a technical security flaw is to
install a patch provided by the vendor. Sometimes the process of determining mitigation
strategies is called control analysis.
Transference
Transference is the process of allowing another party to accept the risk on your behalf. This is
not widely done for IT systems, but everyone does it all the time in their personal lives. Car,
health and life insurance are all ways to transfer risk. In these cases, risk is transferred from
the individual to a pool of insurance holders, including the insurance company. Note that this
does not decrease the likelihood or fix any flaws, but it does reduce the overall impact
(primarily financial) on the organization.
Acceptance
Acceptance is the practice of simply allowing the system to operate with a known risk. Many
low risks are simply accepted. Risks that have an extremely high cost to mitigate are also
often accepted. Beware of high risks being accepted by management. Ensure that this strategy
is in writing and accepted by the manager(s) making the decision. Often risks are accepted
that should not have been accepted, and then when the penetration occurs, the IT security
personnel are held responsible. Typically, business managers, not IT security personnel, are
the ones authorized to accept risk on behalf of an organization.
Avoidance
7
4
Avoidance is the practice of removing the vulnerable aspect of the system or even the system
itself. For instance, during a risk assessment, a website was uncovered that let vendors view
their invoices, using a vendor ID embedded in the HTML file name as the identification and
no authentication or authorization per vendor. When notified about the web pages and the risk
to the organization, management decided to remove the web pages and provide vendor
invoices via another mechanism. In this case, the risk was avoided by removing the
vulnerable web pages.
Review Questions
1. Explain three ways of mitigating against risk.
2. Describe the relationship between attack ,threat and vulnerability.
3. Why is it important to quantify risk before developing mitigating mechanisms ?
4. How can a network manager secure a wireless network?
5. Distinguish between quantitative risk assessment and qualitative risk assessment.
6. A disaster is a catastrophic even that may not be mitigated by traditional risk
mitigation strategies. Outline two ways an organization can prepare for a disaster.
7
5
References and suggested further reading
SAMPLE EXAM
Question 1
Question 2
Question 3
Individual hosts:
Broadcast address:
Question 5
a) For each of the following network hardware components below, indicate
the function and OSI layer it operates in. (10 marks)
Network Adapter
Modem
Repeater (Regenerator)
Bridge
Hub
b) Using relevant illustrations describe the workings of a bus topology
Network. (6 marks)
Give two advantages and two disadvantages of bus networks. (4 marks
7
8
7
9