0% found this document useful (0 votes)
3 views112 pages

Networking Unit IV

The document outlines the essentials of network design, including the basics of network layout, topologies, and key networking devices such as routers, switches, and hubs. It emphasizes the importance of planning physical and logical layouts, understanding user needs, and evaluating existing infrastructure for effective network performance. Additionally, it discusses various networking technologies, protocols, and the advantages and disadvantages of different devices used in networking.

Uploaded by

Ian Carlo Cahilo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views112 pages

Networking Unit IV

The document outlines the essentials of network design, including the basics of network layout, topologies, and key networking devices such as routers, switches, and hubs. It emphasizes the importance of planning physical and logical layouts, understanding user needs, and evaluating existing infrastructure for effective network performance. Additionally, it discusses various networking technologies, protocols, and the advantages and disadvantages of different devices used in networking.

Uploaded by

Ian Carlo Cahilo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 112

Group 4

Network Design
Essentials
BASICS OF A NETWORK LAYOUT AND
STANDARD NETWORK TOPOLOGIES

07 March, 2025
Network Layout

Physical Layout Logical Layout

The tangible arrangement The abstract design of


of network devices data flow (IP addressing,
(computers, switches, routing, protocols)
cables) in a space. regardless of physical
connections.
Designing a Network Layout
1. Identify Requirements: Consider capacity, security, and
future scalability.
2. Select a Topology: Choose a physical and logical
arrangement (e.g., star, bus, mesh) that fits your needs.
3. Plan Physical Layout: Determine where devices and
cables go for optimal performance and minimal
interference.
4. Map Logical Flow: Define how data travels between
devices (subnets, VLANs, etc.).
5. Document & Update: Keep clear diagrams and notes to
simplify troubleshooting and upgrades.
Business/User Needs
User Budget &
Goals Applications Performance Security Growth
Count

Determine How many users Types of Required Identify needed Outline financial
network purposes or devices will applications bandwidth, low security limits and future
(e.g., file sharing, be supported? (e.g., cloud latency, and high measures expansion plans.
internet access, services, reliability. (firewalls,
VoIP, video collaboration encryption,
conferencing). tools). access controls).
Existing Infrastructure
Current
Bottlenecks Compatibility
Setup

Review present Identify any Ensure new


network topology, limitations or solutions work
hardware, and performance with existing
software. issues. systems.
Network Topology

Physical Topology Logical Topology

The path data takes


How devices are physically
through the network,
connected (e.g., star, bus,
regardless of physical
ring, mesh, hybrid).
layout.
Cabling type, device
Includes IP addressing
placement, and
schemes, subnetting, and
environmental influences. data flow (broadcast vs.
point-to-point).
Factors to Consider When
Choosing a Topology
Maintenance
Cost Scalability Reliability Performance Security

Consider Evaluate how Look at how the Assess if the Determine the Consider the
equipment, easily additional topology network meets potential complexity of
cabling, and devices can be handles failures your speed and vulnerabilities troubleshooting
installation added as your and whether bandwidth and how easily and managing
expenses, along network grows. backup paths requirements for the network can the network
with future are available. current and be secured. day-to-day.
upgrade costs. future use.
NETWORKING
TECHNOLOGIES

START!
WIRED VS. WIRELESS

WIRELESS WIRED

Determine the appropriate mix of wired (Ethernet) and wireless


(Wi-Fi) connections.
Consider factors such as speed, reliability, and mobility.
NETWORK DEVICES

ROUTER SWITCHES MODEM


Connect different Connect devices Connect to the
networks and within a local internet service
manage traffic. network. provider.
NETWORK DEVICES

FIREWALL ACCESS POINT


Provide security Enable wireless connectivity.
and control
network access.
PROTOCOLS

TCP/IP The foundation of the internet. HTTP, FTP, SMTP, DNS, Telnet, SSH, and VoIP

DNS Translates domain names to IP addresses. www.amazon.com, www.google.com

DHCP Automatically assigns IP addresses to devices. router, wireless devices

NordVPN, Atlas VPN, Norton Secure VPN,


VPN Creates secure remote connections.
ExpressVPN

QoS Quality of Service, prioritizes network traffic.


CLOUD NETWORKING

Consider cloud based solutions, and how they will integrate


with on premises equipment
Basic
Networking
Devices
Presenters:
Vergara, Darlene
Chingcuangco, Janet
Juanir, Jan Jelo
01

HUB
A network hub is a node that broadcasts data to every
computer or Ethernet-based device connected to it.
HUB
A hub is less sophisticated than
a switch, which can isolate data
transmissions to specific devices.
Network hubs are best suited for
small, simple local area network
environments. Hubs can't provide
routing capabilities or other
advanced network services.
The “DUMB SWITCHES”
Network hubs are far less
common today
FEATURES OF HUBS
It supports half-duplex transmission
It works with shared bandwidth and broadcasting.
The hub can provide a high data transmission rate to different devices.
It can detect collisions in the network and send the jamming signal to each
port.
Hub does not support Virtual Lan and spanning tree protocol.
It is unable to filter the data and hence transmit or broadcast it to each port.
It cannot find the best route/ shortest path to send any data, which makes it
an inefficient device.
HOW IT WORKS?

They connect multiple computers


together and transmit data received at
one port to all its other ports without
restriction.

All devices connected to a network


hub equally share all available
bandwidth.
TYPES OF HUBS
ACTIVE HUBS

Active hubs repeat and strengthen incoming transmissions. They are also
sometimes known as repeaters.

PASSIVE HUBS

Passive hubs serve as a point of connectivity without any additional capabilities.

INTELLIGENT HUBS

The intelligent hub comprises a special monitoring unit named a Management


Information Base that helps troubleshooting and analyzing network problems.
ADVANTAGES OF HUBS
It is less expensive.
It does not impact network performance.
Hub support different network media.

DISADVANTAGES OF HUBS
It cannot find the best/ shortest path of the network.
No mechanism for traffic detection.
No mechanism for data filtration.
Not capable of connecting to different network topologies like token ring,
ethernet, etc.
02

SWITCH
The Switch is a network device that is used to segment
the networks into different subnetworks called subnets or
LAN segments.
SWITCH
It is responsible for filtering and
forwarding the packets between
LAN segments based on MAC
address.
Switches have many ports, and
when data arrives at any port,
the destination address is
examined first and some checks
are also done and then it is
processed to the devices.
Supports different types of
communications
FEATURES OF SWITCH
It operates in the Data Link Layer in the OSI Model.
It performs error checking before forwarding data.
It transfers the data only to the device that has been addressed.
It operates in full duplex mode.
It allocates each LAN segment to a limited bandwidth.
It uses Unicast (one-to-one), multicast (one-to-many), and broadcast (one-to-
all) transmission modes.
Packet-switching techniques are used to transfer data packets from source to
destination.
Switches have a more significant number of ports.
HOW IT WORKS?

When the source wants to send the


data packet to the destination, the
packet first enters the switch and the
switch reads its header and finds the
MAC address of the destination to
identify the device then it sends the
packet out through the appropriate
ports that lead to the destination
devices.
TYPES OF SWITCH
VIRTUAL SWITCHES
Virtual Switches are the switches that are inside Virtual Machine hosting
environments.

ROUTING SWITCHES
These are the switches that are used to connect LANs.They also have the work of
performing functions in the Network Layer of the OSI Model.

UNMANAGED SWITCHES
Unmanaged Switches are the devices that are used to enable Ethernet devices that
help in automatic data passing. These are generally used for home networks and
small businesses.
TYPES OF SWITCH
MANAGED SWITCHES
Managed Switches are switches having more complex networks. SNMP (Simple
Network Management Protocol) can be used for configuring managed switches.

LAN SWITCHES
LAN (Local Area Network) Switches are also called ethernet switches or data
switches.

POWER OVER ETHERNET SWITCHES


Power over Ethernet (POE) are the switches used in Gigabit Ethernets. PoE help in
combining data and power transmission over the same cable so that it helps in
receiving data and electricity over the same line.
TYPES OF SWITCH
SMART SWITCHES
Smart Switches are switches having some extra controls on data transmissions but
also have extra limitations over managed Switches.

STACKABLE SWITCHES
Stackable switches are connected through a backplane to combine two logical
switches into a single switch.

MODULAR SWITCHES
These types of switches help in accommodating two or more cards. Modular
switches help in providing better flexibility.
ADVANTAGES OF SWITCH
Prevents traffic overloading in a network by segmenting the network into
smaller subnets.
Increases the bandwidth of the network.
Less frame collision as the switch creates the collision domain for each
connection.

DISADVANTAGES OF SWITCH
It can not stop traffic destined for a different LAN segment from traveling to
all other LAN segments.
Switches are more expensive.
03

ROUTER
A Router is a networking device that forwards data
packets between computer networks.
ROUTER
One or more packet-switched
using a router.
By sending data packets to their
intended IP Addresses, it
manages traffic between different
networks and permits several
devices to share an Internet
Connection
A router has several interfaces
by which it can connect to
several host systems. Routers
are the devices that are operated
on the Network Layer of the OSI
Model, these are the most
common devices used in
networking.
HOW IT WORKS?

A router determines a packet’s future


path by examining the destination IP
address of the header and comparing
it to the routing database. The list of
routing table outlines how to send the
data to a specific network location.
They use a set of rules to determine
the most effective way to transmit the
data to the specified IP address.
TYPES OF ROUTER
BROADBAND ROUTER
These are one of the important kinds of routers. It is used to do different types of
things. it is used to connect Computer or it is also used to connect to the internet.

WIRELESS ROUTER
These routers are used to create a wireless signal in your office or home.

WIRED ROUTER
Wired Router is used to connects multiple wired devices using a Ethernet cable, It
takes the transmission data from the modem and distribute it to a further network, it
is widely used in schools and small offices.
TYPES OF ROUTER
EDGE ROUTER
These are located at the edges usually connected to an Internet Service Provider,
and distribute packets across multiple packets.

CORE ROUTER
Core routers distribute packets within the same network. The main task is to carry
heavy data transfers.
TYPES OF ROUTER
VIRTUAL ROUTER
They are implemented using a software on the virtual machine , and they are more
flexible and scalable.

PORTABLE ROUTER
They are used to create private Wi-Fi and hence designed for easy portability.
FUNCTIONS OF A ROUTER

FORWARDING
The router receives the packets from its input ports, checks its header, performs
some basic functions like checking checksum, and then looks up to the routing
table to find the appropriate output port to dump the packets onto, and forwards
the packets onto that output port.

ROUTING
Routing is the process by which the router ascertains what is the best path for the
packet to reach the destination

NETWORK ACCESS TRANSLATION


Routers use NAT to translate between different IP address ranges. This allows
devices on a private network to access the internet using a single public IP
address.
FUNCTIONS OF A ROUTER

SECURITY
Routers can be configured with firewalls and other security features to protect the
network from unauthorized access, malware, and other threats.

QUALITY
outers can prioritize network traffic based on the type of data being transmitted.

VIRTUAL PRIVATE NETWORK


Routers can be configured to allow remote users to connect securely to the
network using a VPN.
FUNCTIONS OF A ROUTER

BANDWIDTH MANAGEMENT
Routers can be used to manage network bandwidth by controlling the amount of
data that is allowed to flow through the network.

MONITORING AND DIAGNOSTICS


Routers can be configured to monitor network traffic and provide diagnostics
information in the event of network failures or other issues.
ARCHITECTURE OF A ROUTER

INPUT This is the interface by which packets are admitted into


the router, it performs several key functions as
PORT terminating the physical link at the router.
ARCHITECTURE OF A ROUTER

SWITCHING This is the heart of the Router, It connects the input


ports with the output ports.
FABRIC
IMPLEMENTATION OF SWITCHING FABRIC

SWITCHING via MEMORY


In this, we have a processor which copies the packet from input ports and sends it
to the appropriate output port.

SWITCHING via BUS


In this implementation, we have a bus that connects all the input ports to all the
output ports.

SWITCHING via INTERCONNECTION NETWORK


This is a more sophisticated network, here instead of a single bus we use a 2N bus
to connect n input ports to n output ports.
ARCHITECTURE OF A ROUTER

OUTPUT This is the segment from which packets are transmitted


out of the router.
PORT
ARCHITECTURE OF A ROUTER

It executes the routing protocols, and it works like a


ROUTING traditional CPU. It employs various routing algorithms
PROCESSOR like the link-state algorithm, distance-vector algorithm,
etc. to prepare the forwarding table.
ADVANTAGES OF ROUTER
Easier Connection
Security
NAT Usage
Supports Dynamic Routing
Filtering of Packets

DISADVANTAGES OF ROUTER
Slower
High Cost
Need for Configuration
Quality Issues
Bandwidth Shortages
Host A Host C

04 Hub 1
Bridge
Hub 2

Host B Host D

BRIDGE
ABOUT US
A bridge connects two or more network segments at Layer 2
(Data Link Layer) to make them function as a single network.
What is a MAC
Address?
Host A Host C

A MAC (Media Access Control) Address Hub 1 Hub 2


is a unique identifier assigned to a Bridge

network device’s network interface card


Host B Host D
(NIC).

A MAC address is a 12-digit hexadecimal number, usually written in one of


these formats:
MM:MM:MM:SS:SS:SS (e.g., A1:B2:C3:D4:E5:F6)
MM-MM-MM-SS-SS-SS (e.g., 00-1A-2B-3C-4D-5E)
*The first six digits represent the manufacturer (Organizationally Unique Identifier - OUI),
while the last six digits are unique to the device.*
HOW BRIDGE WORKS
Receiving: The bridge collects data packets from both network
1 segments.

2 Learning: It builds a MAC address table to map devices to segments.

3 Filtering: Blocks data if the destination is on the same segment.

4 Forwarding: Sends data to the correct segment if needed.

5 Repeating: Continuously processes data from both sides.


TYPES OF BRIDGES

Source
Transparent Translational
Routing
Bridge Bridge
Bridge
Works invisibly, Converts and transmits
forwarding or blocking Used in token ring data between different
data based on MAC networks, it embeds network types, such as
addresses. It does not the entire route in data Token Ring and
require network frames. The source Ethernet. It enables
reconfiguration when station defines the communication between
devices are added or exact path the data incompatible networking
removed. must follow. systems.
ADVANTAGES AND BRIDGE
DISADVATAGES
Advantages Disadvantages

Extend networks by connecting different


More expensive than hubs and repeaters.
topologies.

Improve bandwidth with separate collision Slower due to additional processing of MAC
domains. addresses.

Support different MAC protocols with Cannot filter individual data in high broadcast
buffering. traffic.

Easy to install with high reliability and Susceptible to broadcast storms in large
maintainability. networks.
Local Network

Local

05 Gateway
Network

Server

Local Network

GATEWAY
ABOUT US
A gateway connects two different networks with different
communication protocols (operates at multiple OSI layers).
OSI MODEL
Physical Layer – Deals with the physical connection of devices and the transmission
1
of raw bits (0s and 1s) over cables, radio waves, or fiber optics.
Data Link Layer – Manages the transfer of data frames between two devices on the
2
same network and handles error detection (e.g., MAC addresses).
Network Layer – Responsible for routing data between different networks using IP
3
addresses (e.g., routers).
Transport Layer – Ensures reliable data transfer, error correction, and proper
4
sequencing (e.g., TCP, UDP).
Session Layer – Establishes, maintains, and terminates communication sessions
5
between devices.
Presentation Layer – Translates data formats, encrypts/decrypts data, and
6
compresses information for applications (e.g., JPEG, SSL/TLS encryption).
Application Layer – Provides network services directly to users, such as web
7
browsing (HTTP), email (SMTP), and file transfer (FTP).
HOW GATEWAY WORKS

1 Reception: The gateway receives data from the network.

2 Inspection: It intercepts and analyzes the received data.

3 Routing: The data is forwarded to the correct destination address.

Conversion: The data format is adjusted for compatibility with


4 the receiver’s network.

5 Delivery: The final processed data is sent within the network.


TYPES OF GATEWAYS

(Based on the Direction


of the flow of data)

(Based on Functionaliy)
TYPES OF GATEWAYS
(Based on the Direction of the flow of data)

Unidirectional Bidirectional
Gateways Gateways

Allows data to flow in only one Allows data to flow in both


direction—changes from the directions—changes from both
source are copied to the the source and destination are
destination, but not vice versa. synchronized.
TYPES OF GATEWAYS
(Based on Functionaliy)

Email Security Gateway


Used by businesses and organizations to protect against phishing,
malware, and spam.
TYPES OF GATEWAYS
(Based on Functionaliy)

Cloud Storage Gateway


Used in cloud-based backup and hybrid storage solutions to integrate
on-premises storage with cloud platforms.
TYPES OF GATEWAYS
(Based on Functionaliy)

Network Gateway
Used in enterprise networks, ISPs, and homes to connect different
networks with different protocols.
TYPES OF GATEWAYS
(Based on Functionaliy)

Internet-To-Orbit (I2O) Gateway


Used in satellite communication and space missions to link ground
networks with spacecraft.
TYPES OF GATEWAYS
(Based on Functionaliy)

IoT (Internet of Things) Gateway


Used in smart cities, industrial automation, healthcare, and home
automation to connect IoT devices to the cloud.
TYPES OF GATEWAYS
(Based on Functionaliy)

VoIP (Voice over Internet Protocol)


Trunk Gateway
Used by call centers, enterprises, and telecom providers to enable VoIP
calls over traditional phone lines.
ADVANTAGES AND GATEWAY
DISADVATAGES
Advantages Disadvantages

Connects two different networks. Expensive and complex to implement.

Filters harmful traffic for security. Difficult to manage.

Converts protocols for seamless


Causes delays due to data conversion.
communication.

Gateway failure can disrupt network


Protects from external attacks.
connections.
06

MODEM
ABOUT US
A modem (MOdulator-DEModulator) converts digital signals to
analog for transmission over telephone lines and vice versa.
HOW MODEM WORKS

1 Data Generation: Computer generates digital data (0s and 1s).

Modulation: Digital data is converted into analog signals


2 for transmission.

3 Transmission: Modulated data is sent over the communication line.

Demodulation: Analog signals are converted back into


4 digital form.

5 Decoding: The computer receives and processes the digital data.


TYPES OF MODEM

DIAL-UP MODEM
Uses telephone lines, slow speeds (up to 56 Kbps)
TYPES OF MODEM

DSL MODEM
Uses telephone lines but allows internet and voice
simultaneously.
TYPES OF MODEM

CABLE MODEM
Uses coaxial cables for high-speed internet.
TYPES OF MODEM

FIBER OPTIC MODEM


Uses light signals for ultra-fast speeds.
TYPES OF MODEM

WIRELESS MODEM
Uses cellular networks (4G/5G) for internet access.
ADVANTAGES AND MODEM
DISADVATAGES
Advantages Disadvantages

Performs modulation and demodulation


Slows down when connected to a hub.
simultaneously.

Cannot track traffic between LAN and the


Enables LAN to connect to the internet.
internet.

Converts digital signals into analog for Limited number of network devices can
communication. connect.

Affordable with varying features based on


Vulnerable to security-related attacks.
cost.
07

REPEATER
ABOUT US

It extends the range of remote wireless access points.


REPEATER
A networking device called a
repeater aids in signal
regeneration to expand a
network's coverage area.
FEATURES

EXTENSION INTRICACY
It regenerates signals. It adds complexity in
the network.

RELIABLE COST
It reduces error and Repeater needs
loss of data. power.
TYPES OF REPEATERS

According to the According to the


Type of Signals Domain of LAN Networks

According to the Type Based on


of Connected Network Technologies
Type of Signals

Analog
Repeater

Analog repeaters receives the analog


signal, amplifies it and then
regenerates it as the output.
Type of Signals

Digital
Repeater

Digital repeaters are the type of


repeaters that does not amplify digital
signal but regenerates it directly.
Type of Connected Network

Wired
Repeater

Wired repeaters are used in wired


Local Area Networks(LANs).
Type of Connected Network

Wireless
Repeater

Wireless repeaters are used in


wireless Local Area Networks(LANs)
and cellular networks.
Domain of LAN Networks

Local
Repeater

Local Repeaters are used in Local


Area Networks where the network is
very small.
Domain of LAN Networks

Remote
Repeater

Remote Repeaters are used in Local


Area Networks where network is very
large.
Based on Technologies
It is used for the Telephone repeaters are
communication of fibre optic majorly used for
communication systems. communication in submarines.

Optical Telephone
Repeater Repeater

01 02 03 04

Microwave Radio
Repeater Repeater
In microwave repeaters high It transmits all the received
power transmitters and data into radio signals.
sensitive receivers are used.
ADVANTAGES

EXTENDS
$20 $22 $28
BETTER ENHANCED
THE
PERFORMANCE SIGNALS
NETWORK
for better transmission for better reliability for long distances
of data
DISADVANTAGES

$20 $22 $28


NETWORK COLLISION NETWORK
TRAFFIC DOMAIN SEGMENTATION
08

ABOUT
ACCESSUS POINT
It provides other locations to connect.
ACCESS
POINT
An access point (AP) is a term
used for a network device that
bridges wired and wireless
networks.
TYPES OF ACCESS POINT

According to According to
Application Frequency Band

According to According to
Installation Method Controller Needed
Application

Commercial
AP

It is ideal for commercial settings that


need aesthetics and have plenty of
access users
Application

Enterprise-level
AP

It meets strict security criteria and is


appropriate for usage in major
corporations, businesses, and other
locations.
Installation Method

In-wall
AP

In-wall AP must be anchored into the


wall during installation.
Installation Method

Ceiling
AP

During installation, it may be fastened


directly to the ceiling or wall without
penetrating the wall.
Frequency Band

Single-Frequency
AP

It only supports 2.4G and its


transmission speed ranges from 150
Mbps to 450 Mbps.
Frequency Band

Dual-Frequency
AP

It supports both 2.4G and 5.8G


simultaneously and is referred to as a
dual-band AP.
Controller Needed
Most commonly employed in
households and small networks,
01 AP has a functionally
comprehensive set of capabilities.

Single- Controller-
AP Needed AP

This AP can only be used


by configuring a specific
wireless controller, which is 02
required to utilize this AP.
ADVANTAGES

$20 $22 $28


EXPANDED FLEXIBLE
SCALABILITY
COVERAGE PLACEMENT
for convenience for better management for signal boosts
DISADVANTAGES

$20 $22 $28


REQUIRES ADDITIONAL
COMPLEXITY
A ROUTER COST
ADDRESSING AND SUBNETTING

Divide the network into smaller


01 subnets to improve
performance and security.

IP Allocate IP addresses
Addressing efficiently.
Develop an IP addressing
scheme that is scalable and Subnetting
efficient.

Use private IP addresses for 02


internal networks.
NETWORK SECURITY
Monitor network traffic for Control access to network
malicious activity. resources.
Intrusion
Detection/Prevention Access Control
Systems (IDS/IPS) Lists (ACLs)

01 02 03 04
Firewalls VPNs
Implement firewalls to control Provide secure remote access.
network traffic and prevent
unauthorized access.
NETWORK SECURITY

Encrypt sensitive data.

Encryption

05 06 07
Security User
Audits Authentication
Regularly check the network for Implement strong password
vulnerabilities. policies, and multi factor
authentication.
NETWORK PERFORMANCE AND
RELIABILITY
Bandwidth Monitoring
Planning and
Estimate bandwidth Management
requirements and ensure Use network monitoring tools
sufficient capacity. to track performance and
identify potential problems.

Redundancy Quality of
Service
Implement redundant links (QoS)
and devices to prevent single
Prioritize traffic based on
points of failure.
application needs.
08

Performing Basic
ABOUT US
Network Services
Introduction

In today's interconnected world, network services play


a crucial role in ensuring efficient resource sharing and
remote access. This report covers five fundamental
network services: Folder Sharing, Folder Redirection,
Remote Desktop Configuration, Implementation and
Testing, and Documentation.
5 Main Topics
Performing Basic Network Services

Topic #1 Folder Sharing

Topic #2 Folder Redirection

Topic #3 Remote Desktop Configuration

Topic #4 Documentation

Topic #5 Implementation and Testing


Topic #1 Folder Sharing

Folder sharing allows users within a network to access, edit, or manage


files from a centralized location. This is commonly used in offices and
organizations to streamline workflow and facilitate teamwork.
Topic #1 Folder Sharing

Benefits

Centralized file management for easy access.


Enhanced collaboration among users without the need for email attachments.
Reduced redundancy and duplication of files, saving storage space.

Security Considerations

Use Access Control Lists (ACLs) to restrict access to authorized personnel.


Enable encryption for sensitive data.
Monitor shared folders regularly for unauthorized access or modification.
Apply password protection for additional security.
Topic #1 Steps to Configure Folder Sharing:

1 4

Done
5

3
Topic #2 Folder Redirection

Folder Redirection is a network feature that allows user folders (such as


Documents, Desktop, or Downloads) to be stored on a network drive
rather than a local device. This helps in centralizing user data, ensuring
backups, and allowing seamless access from multiple devices.
Topic #2 Folder Redirection

Benefits

Centralized storage for easier backups and disaster recovery.


Seamless roaming experience, allowing users to access their data from any device.
Reduced local storage usage, preventing data loss from hardware failure.
Enhanced security by keeping user data in a controlled environment.

Security Considerations

Use NTFS permissions to limit access to redirected folders.


Enable EFS (Encrypting File System) or BitLocker to encrypt redirected data.
Regularly back up redirected folders to prevent data loss.
Restrict access to network paths using Group Policy Settings.
Steps to Configure Folder Redirection
Topic #2 Alternative: Using Local Group Policy Editor (gpedit.msc)

1 2
Topic #3 Remote Desktop Configuration

Remote Desktop Protocol (RDP) enables users to access and control a


computer remotely. This is commonly used by IT administrators to
manage systems or by employees to work remotely.
Topic #3 Remote Desktop Configuration

Benefits

Allows remote troubleshooting and system administration.


Facilitates work-from-home or remote operations.
Securely encrypted connection prevents unauthorized access.
Reduces physical intervention for IT maintenance.

Security Considerations
Enable Network Level Authentication (NLA) to require authentication before connecting.
Use strong passwords and enable two-factor authentication (2FA).
Restrict RDP access to trusted devices and IP addresses using firewall rules.
Change the default RDP port (3389) to a non-standard port for added security.
Monitor RDP logs to detect unauthorized access attempts.
Topic #3 Steps to Configure Remote Desktop

1 2 3 4

5 6 7 8
Topic #4 Documentation

Documentation is a critical aspect of network management that involves


recording all network configurations, security policies, and operational
procedures. Proper documentation ensures that IT administrators can
efficiently manage, troubleshoot, and expand network services in the
future.

Network Diagrams IP Address Allocation

Configuration Files Policies and Procedures


Topic #5 Implementation and Testing

Implementation and testing are crucial stages in deploying network


services. Implementation involves setting up and configuring the network
services based on predefined requirements, ensuring smooth integration
into the existing infrastructure. Testing verifies that these services
function correctly, meet performance expectations, and adhere to
security standards before full deployment.

Phased Implementation Testing Procedures

Security & Performance Testing Documentation Updates


THANK YOU

You might also like