My Network Admin Data Tips

Network Topology Logical Layout



Logical Topology

The figure shown is the logical layout of the whole network of the school. This figure shows how the computers are connected to the MDF of the network. It also shows the three major hierarchical network design layer of the network (Core layer, Distribution layer, and Access Layer).

There are only two kinds of cable that comprise the layout; CAT 5e UTP cable and an outdoor CAT 5e UTP cable.

The MDF is composed of a multilayer switch, a 24-port switch, an FTP server, the administrator’s computer and the router for the connection to the ISP. It is also illustrated in the figure that every section is assigned to a specific Virtual LAN by the researchers. The IP addressing is also included to show the addressing assigned by the researchers to the different areas.

In addressing the different users, the proponents used different Virtual LANs to group our users based on the restrictions and privileges that they should have. The Virtual LANs are assigned to the multilayer switch for easy manageability of the network administrator. Student users are assigned to a different Virtual LAN in order to separate them with the other area that may have different privileges and restrictions like the faculty and administrators, all with different Virtual LANs depending on the needs of these areas. In creating the Virtual LANs, the researchers also considered the future growth of the locale. Another reason of having different Virtual LAN for each department is the anticipation of the increase in the number of users. If the additional users are to be added, it will not be applicable to have one Virtual LAN for different department because it will be more difficult to organize and manage them since they are included in one Virtual LAN and they are having different functions. In addition, each department will be using different systems and programs accordingly.


Read More Add your Comment 0 comments


Sample of Network Requirements for Schools




Technical Requirements


Reliability
Internet and network availability during business hours.
Wireless internet connection for wireless devices of students and employees.
Uninterrupted power supply for network equipment, servers and the administrators end devices.

Scalability
Provision for expansion and upgrades of network infrastructure.

Security
Restrictions of forbidden web sites for student PC.
Regulation of users where only teachers and administrators can access the File Server.
Network administrator passwords for network devices.
Regulation of the wireless Internet where it can only be accessed by registered MAC-address.
Port security implementation.
Secured physical location of network devices and servers.
Antivirus Software and firewall.

Manageability
Hierarchical network design.
Implementation of Virtual LAN and VTP.
Use of network tools for troubleshooting.
Proper orientation of employees with the use of the network (security policies, file server).

Users
The main users of PCHS are the students, teachers, and administration (accountant, registrar, principal, librarian, guidance, computer technicians and network administrators). Every user must be aware of the network policies.

For Network Administrator
Has all the physical access to every equipment and devices on the network.
Can access network devices remotely such as router, wireless router and switches.
Can access all websites.
Can upload and download files to and from the FTP server.
Can install and uninstall programs and software.

For Computer Technicians
Has access to network and end devices physically.
Has access to the internet.
Has access to social networking sites.
Restricted access on video streaming web sites.
Restricted access on games and pornographic web sites.
Restricted access to Peer to Peer file sharing such as torrents.
Can install and uninstall programs and software.

For Principal
Has an account for use on FTP server.
Can view faculty members’ file but cannot modify.
Has access to social networking sites.
Has access to video streaming sites.
Restricted access on games and pornographic web sites.
Restricted access to Peer to Peer file sharing such as torrents.
Cannot access network devices physically and remotely.
Cannot install/uninstall programs and software.

For Faculty Members
Have account for use on FTP server.
Cannot view other FTP account files.
Have access to the internet.
Have access to social networking sites.
Restricted access on video streaming sites.
Restricted access on games and pornographic web sites.
Restricted access on peer to peer file sharing such as torrents.
Cannot access network devices physically and remotely.
Cannot install/uninstall programs and software.

For Non-teaching Personnel
(Accountant, Guidance, Registrar, Librarian)
Have  account for use on FTP server.
Have access to the internet.
Have access to social networking sites.
Restricted access on video streaming sites.
Restricted access on games and pornographic web sites.
Restricted access on peer to peer file sharing such as torrents.
Cannot access network devices physically and remotely.
Cannot install/uninstall programs and software.

For Students
Have access to the internet.
Observe restrictions on social networking sites.
Observe restrictions on video streaming sites.
Observe restrictions on games and pornographic web sites.
Observe restrictions on peer to peer file sharing such as torrents.
Cannot access network devices physically and remotely.
Cannot install/uninstall programs and software.

For Wireless Connection Users
Availability of internet access only if the MAC address of device is registered.
Observe restrictions on social networking sites.
Observe restrictions on video streaming sites.
Observe restrictions on games and pornographic web sites.
Observe restrictions on peer to peer file sharing such as torrents.
Cannot access network devices physically and remotely.

Applications
Here are the lists of applications that will be supported by the network.
NetOP, used to monitor student activity, as well as for discussion and data collection by teachers.
Telnet, application used by network administrator to remotely configure network devices.
FTP Clients, used by faculty members and administrators to connect to FTP server.



Read More Add your Comment 0 comments


Observe the Current Network Environment





Network configuration documentation provides a logical diagram of the network and detailed information about each component.

Network documentation should include these components:

Network configuration table
End-system configuration table
Network topology diagram
The existing network strengths and weaknesses and how they impact the business goals


Network Configuration Table

Contains accurate, up-to-date records of the hardware and software used in a network.

Example:


The table in the figure illustrates the data set that should be included for all components:


  • Type of device, model designation
  • IOS image name 
  • Device network hostname 
  • Location of the device (building, floor, room, rack, panel) 
  • If it is a modular device, include all module types and in which module slot they are located
  • Data link layer addresses 
  • Network layer addresses 
  • Any additional important information about physical aspects of the device


End-system Configuration Table


Contains baseline records of the hardware and software used in end-system devices such as servers, network management consoles, and desktop workstations. An incorrectly configured end system can have a negative impact on the overall performance of a network.

For troubleshooting purposes, the following information should be documented:

  • Device name (purpose) 
  • Operating system and version 
  • IP address 
  • Subnet mask
  • Default gateway, DNS server, and WINS server addresses 
  • Any high-bandwidth network applications that the end-system runs
Example:

•Network Topology Diagram

Graphical representation of a network, which illustrates how each device in a network is connected and its logical architecture. A topology diagram shares many of the same components as the network configuration table. Each network device should be represented on the diagram with consistent notation or a graphical symbol. Also, each logical and physical connection should be represented using a simple line or other appropriate symbol. Routing protocols can also be shown.

A physical network diagram shows the physical layout of the devices connected to the network. 

Typically includes:
 Device type
Model and manufacturer
Operating system version
Cable type and identifier
Cable specification
Connector type
Cabling endpoints



Example:
A logical network diagram shows how data is transferred on the network.
Typically includes:
Device identifiers
IP address and subnet
Interface identifiers
Connection type
DLCI for virtual circuits
Site-to-site VPNs
Routing protocols
Static routes
Data-link protocols
WAN technologies used
Example:

Example: Physical Layout - All Buildings on campus


Example: Physical Topology – Site LAN


Example: physical Topology

The existing network strengths and weaknesses and how they impact the business goals

The network designer creates a chart that lists each of the identified weaknesses, which business or technical goal is impacted, and how the weakness can be eliminated in the proposed network design.


Example:


Read More Add your Comment 0 comments


What are the Network Requirements?





The Network Requirements section is very detailed. This section helps drive the network design and implementation of new technologies.

The Network Requirements section has the following four subsections:

Business Goals
Technical Requirements
Users
Applications
o Business Goals

The NetworkingCompany designer lists the goals in order of priority. The most important goals are listed first.

Example:



o Technical Requirement

The Networking Company designer evaluates each of the business goals. The designer then determines the technical requirements to meet the goals. These requirements are outlined in the Technical Requirements section under the properties of scalability, availability, security, and manageability.

Example:


o Users

In this section, the different user groups and their access requirements are listed.

o Applications

The network traffic characteristics and requirements of various applications affect the design of the network. This section of the document describes the types of applications the network must support. Any specific network traffic requirements are listed as well.


Read More Add your Comment 0 comments


Network Proposal Executive Summary



Important notes about the Executive Summary:
• The Executive Summary is presented first because it provides the reader with an overview of the complete proposal. The proposal will be read by people with different roles and requirements. These may include managers; network engineers and technicians; marketing and sales consultants; and finance and accounting personnel. By reviewing the Executive Summary first, readers can then decide whether to read through the complete document or read only those sections that apply to their role.
• Although presented first, the Executive Summary cannot be written until the rest of the proposal document has been compiled. This section is therefore the final section to be written.

An executive summary is a report, proposal, or portfolio, etc in miniature (usually one page or shorter). That is, the executive summary contains enough information for the readers to become acquainted with the full document without reading it. Usually, it contains a statement of the problem, some background information, a description of any alternatives, and the major conclusions. Someone reading an executive summary should get a good idea of main points of the document without becoming bogged down with details.
 An executive summary differs from an abstract in that an abstract is usually only about six to eight lines long. Its purpose is to inform the reader of the points to be covered in the report without any attempt to tell what is said about them. Covering no more than a page in length, the executive summary is longer and is a highly condensed version of the most important information the full document contains. Both the executive summary and the abstract are independent elements rather than a part of the body of the document. Both are placed at the beginning of the document.

 With the possible exception of the conclusion and recommendation, the executive summary is the most important part of a report. As such, it should be the best-written and most polished piece of the document. This is because many readers may only look at the executive summary when deciding whether or not to read the entire document. In some companies, the executive summaries are distributed so that employees are informed as to what information is available, and interested readers may request the entire document. In short, you may expect that an executive summary will be read more frequently and by more people than will your entire document.

When writing your executive summary, ask yourself if those who read the summary will be those who will read the entire report. If you are dealing with two different groups of people, you will have to decide how much technical detail to include in the summary. If it is likely that some who read only the executive summary will not have the technical background of the writer or final reader, keep the technical information and vocabulary to a minimum. You might have three types of readers: those who want a full picture but won't check the details (they might read the executive summary, some of the body, the conclusions, and the recommendations), those who read everything (they read the appendices, all the data, the calculations, etc.), and those who are in executive positions, wish to be kept informed on what is going on in the company, and will say "yes" or "no" to a project (they will read the executive summary, the conclusions, and the recommendations). Your executive summary must address all three types of readers.

Since the executive summary is a condensation, when creating it, you omit any preliminaries, details, and illustrative examples. You do include the main ideas, the facts, the necessary background to understand the problem, the alternatives, and the major conclusions. Brevity and conciseness are the keys to a well-written summary. Do not take a few sentences from key sections of the document and string them together. Rather, go over the entire document and make notes of the elements you consider important. From your notes, create a rough draft of the summary. Then, polish what you have written until it is smooth and seamless without unnecessary wordiness. Do not include any introductory or transitional material. Finally, ensure that your executive summary is accurate and representative of your full document. It should not be misleading, but it should give readers the same impression as if they had read the entire report. 


Read More Add your Comment 0 comments


Layout of the Network Architecture Proposal



The proposal layout should be highly readable and aid the reader in locating information. Graphics enhance the readability of a proposal and convey information as well. Text should be legible, typically a serif typeface such as Times Roman, at 10-point to 12-point type. Page margins should be at least 0.5 inches, and page numbers should be included at the top or bottom of each page.



Section
Description
Executive Summary
Discusses the project goals and project scope at a high level. This section demonstrates that the network vendor understands the extent of the project and the role of the network in meeting the business goals. The goal of the summary is to convince the decision-makers of the business benefits of the design. This section is typically one to two pages long.
Network Requirements
Reviews the business goals and network requirements, including users and applications that need to be supported. This section often lists the business goals, in order of priority, with critical goals marked. This section includes the topologies; protocols, hardware, software, and training that are required to meet the business goals.
Current Network Environment
Documents the state of the existing network. This section includes physical and logical diagrams and the IP addressing scheme. The section summarizes the results of the network characterization, including strengths and weaknesses of the existing network. It also documents the user community and applications currently in use, based on the network characterization.
Proposed Physical Design
Describes the physical layout of the proposed design. This section documents trade-offs made to accommodate business goals and technical requirements. The section describes the features and recommended uses for the technologies and devices proposed for the new network design. This section documents the new WAN service and new network equipment. The section also includes proposed network diagrams.
Proposed Logical Design
Describes the logical topology of the proposed network. This section documents any proposed addressing and naming conventions. It describes the routing and switching protocols recommended for the planned network. This section includes recommended security mechanisms and products that support the security policy of the business. The section may include information on recommended network management procedures and applications.
Implementation Plan
Provides a detailed list of the tasks that must be performed to install and implement the new network. This section includes tasks, steps, time required, and proposed schedules.
Cost Proposal
Provides cost proposal for equipment, software, installation, and ongoing support.


Read More Add your Comment 0 comments


Guideline in Network Administration



Cisco Lifecycle Services
Cisco Lifecycle Services is designed to support evolving networks. Cisco Lifecycle Services is a six-phase approach to deploying and operating Cisco technologies.

The six phases of the Cisco Lifecycle Services are:
• The Preparation Phase
• The Plan Phase
• The Design Phase
• The Implement Phase
• The Operate Phase -maintenance
• The Optimize Phase -maintenance


  • In the Prepare phase, the business goals of the project are identified and a business case is created to justify the installation of the network upgrade.
  • During the Plan phase, the network designer performs a comprehensive site and operations assessment of the current network. A project plan is created that includes the tasks, time-lines, risks, responsibilities and the resources required to complete the network design project.
  • In the Design Phase, the designer creates a flexible design that can integrate new technologies into the current operations and existing network infrastructure.
  • During the Implement phase, the network is built according to the approved designs and specifications and tested to ensure it meets the business goals and requirements.
  • The Operate and Optimize phases of the network lifecycle are ongoing and represent the day-to-day operations of the network. Optimizing a network is a continuous process that identifies and resolves potential weaknesses before they become problems for network operations.

The proposal typically contains the following sections:

A. Executive Summary
B. Network Requirements (planning stage)
C. Current Network Environment (planning stage)
D. Proposed Physical Design
E. Proposed Logical Design
F. Implementation Plan
G. Cost Estimate


Read More Add your Comment 0 comments


 

© 2011 My Network Admin Data Tips All Rights Reserved