PowerPoint etwork is a group of two or more computers that are connected to share resources, exchange files, or allow electronic communication. Computers on a network can be connected by cables, telephone lines, radio waves, satellites, infrared.pptx

tigistgm78 29 views 22 slides Jun 21, 2024
Slide 1
Slide 1 of 22
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22

About This Presentation

etwork is a group of two or more computers that are connected to share resources, exchange files, or allow electronic communication. Computers on a network can be connected by cables, telephone lines, radio waves, satellites, infrared


Slide Content

Ethio-Engineering Group (EEG) N etwork and System infrastructure upgrading proposal Amare Tesfa (Network and system engineer) Tages Zegyalew (Cyber security specialist) December 2023 https://ethioengineering.com/

Agenda 01 02 03 04 Objectives of the training Audience ( Network Admins & Engineers, IT Managers and Directors, System Administrators, Security Professionals, ) key expectation after the end of this training Technical Skills , Knowledge , Troubleshooting , Awareness , Documentation , Learning Mindset Current System & Network Infrastructure Overview vulnerability, DC facility , Availability, Security, Awareness and Documentation. Why infrastructure upgrading is crucial Technological, economical, political, Performance , Security , Cost Savings and Business Continuity https://ethioengineering.com/

Agenda 05 06 07 08 Scope and limitation of this training Inclusions ( Network Infrastructure and System Infrastructure ) , Exclusions ( CCTV, Voice over IP and PBX system ) Characteristics of secure infrastructure Business Requirements, Technical Requirements , User Requirements and Performance Requirements Proposed Infrastructure of Ethio-Engineering Group (EEG) Architecture Design, Addressing, Hardware Recommendations, Software Recommendations, Management Tools, Network Security, IPS/IDS and VPN , system Infrastructure. Implementation Plan Phases of Implementation , Timeline , Resource Allocation , Testing and Quality Assurance , Training Plan , Maintenance and Support & Risk Analysis https://ethioengineering.com/

Objectives of the training Stay Current with Technology Understand the latest advancements in technologies, protocols, and hardware to ensure that the organization's network safe and secured Improve Performance and Reliability Optimize network performance by upgrading hardware and software. Ensure that the network can handle the increasing demands of the organization. Enhance Security Learn about the latest security threats and vulnerabilities, and implement best practices for securing the infrastructure . Troubleshooting and Maintenance IT staff with the skills to diagnose and resolve issues efficiently. Provide training on proactive maintenance practices to prevent potential problems and downtime https://ethioengineering.com/

Scalability and Flexibility Up-to-Date Knowledge Enhanced Technical Skills Optimized Performance Compliance Awareness Efficient Troubleshooting key expectation after the end of this training Documentation and Reporting Continuous Learning Mindset https://ethioengineering.com/

Current System & Network Infrastructure Overview Worst Poor Good https://ethioengineering.com/

Problems and opportunities of the existing infrastructure of Ethio-Engineering Group (EEG) with following major datacenter checklist Power and Electronic Security System Vulnerability Fire protection system Power system Cooling System Network infrastructure vulnerability System vulnerability https://ethioengineering.com/

New hardware, software, and protocols may offer faster data transfer speeds , reduced latency , and enhanced overall reliability . . Technological Advancements Infrastructure upgrading is necessary to adopt and integrate new technologies. modernized infrastructure improve efficiency & enhance performance. Why infrastructure upgrading is crucial Infrastructure upgrading is crucial for several reasons, and its importance extends across various sectors, including information technology, transportation, energy, and more. Here are some key reasons why infrastructure upgrading is considered crucial Improved Performance and Efficiency Enhanced Security Scalability Business Continuity and Disaster Recovery O utdated infrastructure is more susceptible to security breaches. Upgrading infrastructure allows organizations to implement the latest security measures encryption technologies, and protection against emerging threats scalable infrastructure to accommodate increased demand for services and resources. expanding needs of the business without compromising performance . Implementing robust disaster recovery plans and resilient infrastructure ensures business continuity even in challenging circumstances. https://ethioengineering.com/

Network Infrastructure Physical or Virtual Servers, SAN (Storage Area Network) and NAS (Network Attached Storage) and Virtualization . . System Infrastructure Scope and limitation of this training Inclusions Exclusions Network Infrastructure System Infrastructure CCTV, Voice over IP and others Digita l communication Network topology, IP Addressing Network Hardware Network Operating Systems, Monitoring and Management Tools and Network Security https://ethioengineering.com/

02 A secure infrastructure is essential to meet business requirements and protect an organization's assets, data, and operations from various cyber threats. The characteristics of a secure infrastructure, aligned with business requirements. Business Requirements 01 The characteristics of a secure infrastructure, in terms of technical requirements, are crucial for protecting an organization's digital assets and ensuring the confidentiality, integrity, and availability of its information. Technical Requirements 04 User requirements play a crucial role in shaping a secure infrastructure, as the design and implementation must align with the needs and expectations of end-users. Here are key characteristics of a secure infrastructure from the perspective of user requirements. User Requirements 03 Performance Requirements Performance is a critical aspect of a secure infrastructure, ensuring that systems operate efficiently and effectively while maintaining security measures. The characteristics of a secure infrastructure in terms of performance requirements Characteristics of secure infrastructure https://ethioengineering.com/

Proposed Network Infrastructure Physical Topology Physical topology defines the physical layout of a network. It shows how various devices are connected to each other in a network, either through cables or wireless connections. Example Network cables, Trunk, Rack, Outlet and other physical layer devices. Note:- After the end of this session Physical diagram (Floor plan) of Ethio-Engineering Group (EEG) start to design. Edrawmax or Microsoft visio can be used. https://ethioengineering.com/

2. Logical Topology Network topology refers to the arrangement of various elements (links, nodes, etc.) in a computer network. It defines the physical or logical layout of the network, outlining how different nodes or devices are connected and how data is transmitted between them. The choice of network topology impacts factors such as performance, scalability, and fault tolerance. There are several common network topologies, each with its own advantages and disadvantages. Here are some of the primary types: (Bus Topology, Star Topology, Ring Topology, Mesh Topology, Hybrid Topology, Tree Topology and Point-to-Point Topology) Proposed Network Infrastructure --Continued - - Note:- After the end of this session Physical diagram (Floor plan) of Ethio-Engineering Group (EEG) start to design. Edrawmax or Microsoft visio can be used. https://ethioengineering.com/

Network Addressing Option A Option B Option B MAC address IP address A MAC address is a unique identifier assigned to a network interface controller for use as a network address in communications within a network segment. It is a 12-digit hexadecimal and layer 2 address An IP address, or Internet Protocol is a 32-bit numerical address, that used to identifies every device connected to the internet. This enables computers and other internet-connected devices, such as mobile phones and Internet-of-Things (IoT) devices, to communicate over the internet and on local-area networks (LANs).  Class of IP address (A, B, C and D) Types of IP address (public, private, WAN) IP address Subnetting IP address allocation methods (static, and dynamic) Two types of IP address (IPv4 and IPv6) Example ( 00-B0-D0-63-C2-26 ) --Continued - - https://ethioengineering.com/

Hardware Requirements Network hardware requirements can vary depending on the specific needs and scale of the network. Here are some common network hardware components that may be required for setting up a basic network. --Continued - - Selecting the right network hardware is crucial for building a reliable and efficient network. Here are some key criteria to consider when choosing network hardware: 1. Performance. - Throughput and Latency 2. Scalability - Choose hardware that can easily scale to accommodate growing network demands. without a significant impact on performance 3. Reliability and Redundancy - Hardware with built-in redundancy features to ensure continuous operation in case of component failures. 4. Compatibility - Ensure that the hardware is compatible with existing network infrastructure, protocols, and standards and other similar brands 5. Ease of Configuration - is it user-friendly interface and straightforward configuration processes. 6. Cost - it's essential to stay within budget https://ethioengineering.com/

Hardware Requirements 03 Firewall A firewall is a network security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules. The primary purpose of a firewall is to establish a barrier between a secure internal network and untrusted external networks, such as the internet. Firewalls play a critical role in preventing unauthorized access, monitoring and controlling network traffic, and protecting against malicious activities. Logging and Auditing Proxy Services Application Layer Filtering Intrusion Detection and Prevention Stateful Inspection Denial of Service (DoS) Protection Security Policies Packet Filtering Access Control Virtual Private Network 02 Switches A switch is a networking device that operates at the data link layer (Layer 2) of the OSI (Open Systems Interconnection) model. It connects devices within a local area network (LAN) and uses the physical addresses (MAC addresses) of devices to forward data to the correct destination. Switches are widely used to improve the efficiency and performance of local networks compared to traditional network hubs . Packet Switching MAC Address Learning Collision Domain Isolation Full-Duplex Communication Port Security It’s Managed VLAN Support STP --Continued - - https://ethioengineering.com/

Hardware Requirements 05 A Router It is a networking device that connects different computer networks together and directs data traffic between them. It operates at the network layer (Layer 3) of the OSI (Open Systems Interconnection) model and is a key component in the functioning are Redundancy and High Availability Packet Forwarding Interconnecting Networks Logical Segmentation Network Address Translation (NAT) Dynamic Routing Static Routing Firewall Functionality VPN (Virtual Private Network) Support Load Balancing 04 Wireless Access Points A Wireless Access Point (WAP) is a networking hardware device that allows Wi-Fi-enabled devices to connect to a wired network using Wi-Fi technology. It acts as a bridge between wired and wireless networks, enabling wireless clients such as laptops, smartphones, and tablets to access network resources and the internet without requiring physical cables. --Continued - - Wireless Connectivity SSID (Service Set Identifier) Security Features Wireless Modes Guest Network Support Band and Channel Mgmt Interfaces Power over Ethernet (PoE) Indoor or Outdoor https://ethioengineering.com/

Software Requirements 1. Network Operating Systems is a specialized operating system designed to manage and facilitate network resources and services. Unlike standard operating systems that primarily focus on managing a single computer or device, a network operating system is specifically geared toward supporting and coordinating multiple devices within a network. NOS plays a crucial role in enabling communication, resource sharing, and efficient network management. Huawei VRP (Versatile Routing Platform) Cisco (IOS) Checkpoint (Gaia ) SonicWall ( SonicOSX ) FortiOS fortinet 2. Monitoring and Management Tools Monitoring and management tools are essential components of network administration, enabling IT professionals to oversee, configure, troubleshoot, and optimize network infrastructure. These tools help ensure the stability, security, and performance of networks. Here are some key types of monitoring and management tools commonly used in IT environments: Network Monitoring Tools: SolarWinds Network Performance Monitor (NPM) Wireshark Nagios PRTG Network Monitor Zabbix Network Management Tools: Microsoft System Center Operations Manager (SCOM) Cisco Prime Infrastructure HP Network Node Manager ( NNMi ) Fortinet FortiManager --Continued - - https://ethioengineering.com/

Virtual Private Network (VPN) Option A Option B Option B VPN A Virtual Private Network (VPN) is a technology that establishes a secure and encrypted connection over the internet, allowing users to access a private network from a remote location as if they were directly connected to the network's local infrastructure. VPNs provide a secure way to transmit data over the internet, ensuring privacy, confidentiality, and integrity of information. Different types of VPNs and when to use them? Remote Access VPN Site-to-site VPN Internet Protocol Security (IPSec) Point–to–Point Tunneling Protocol (PPTP) SSL and TLS Secure Shell (SSH) Example 02 Example 01

1. Server Architecture Server architecture is  the foundational layout or model of a server, based on which a server is created and/or deployed . It defines how a server is designed, different components the server is created from, and the services that it provides. Proposed System Infrastructure There are the two types of server architecture? peer-to-peer network and Client-Server architecture https://ethioengineering.com/

Physical or Virtual Servers Option A Option B Option B Physical Servers Definition - A physical server refers to a tangible, hardware-based computing machine. It consists of physical components such as a motherboard, CPU, memory (RAM), storage devices (hard drives or SSDs), network interfaces, and other hardware elements. Characteristics 1. Independence Each physical server operates as a standalone unit with its own dedicated hardware resources. 2. Isolation Physical servers are physically separated from each other, providing isolation in terms of processing power, memory, and storage. 3. Performance In certain scenarios, physical servers may offer superior performance, especially for resource-intensive applications or workloads. Virtual Servers Definition - A virtual server is a software-based emulation of a physical server. Virtualization technology allows multiple virtual servers to run on a single physical server, sharing its underlying hardware resources. Characteristics - Server Consolidation Running multiple virtual servers on a single physical machine to maximize resource utilization. - Scalability Quickly provisioning additional virtual servers to scale infrastructure based on demand. - Cost Efficiency Achieving cost savings by reducing the number of physical servers and optimizing resource usage. - Resource Utilization Virtual servers allow for better resource utilization since multiple virtual machines can share the same physical resources. - Management and Flexibility .

Contents Title Cost Estimation Pre-Implementation Tasks Implementation Training Plan Maintenance and Support Final Plan Network Rollout System Deployment IT Staff Training User Training Resource Allocation Training Materials and Resources Ongoing Maintenance Plan Support Mechanisms Monitoring and Reporting Hardware Costs Software Costs Risk Analysis Identification of Risks Mitigation Strategies Conclusion Summary of Benefits Call to Action https://ethioengineering.com/

https://ethioengineering.com/