[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now


Exploring an existing network

Posted on 2006-03-28
Medium Priority
Last Modified: 2010-03-18
I am very new to networking.  Walking into an existing network; the administrators who set up the network have vanished, leaving not a trace of documentation.  I am a programmer by trade, need to learn networking in a hurry.  Happily, the network is functioning OK, at this point just need to connect a new printer, stuff like that.  But eventually I will need to actually do something hard, and before the crisis hits I'd like to get a good understanding of the network.

I figured I should start by knowing what the pieces are.  I made an elementary map of the connections that I can see (e.g., the ones not in the wall). Basically there is the cable gateway, and there are two routers, they are what I would call daisy chained, not sure if that's correct terminology.  There are a few peripherals, one server, four hard-wired workstations, one wireless laptop.  Is it useful to know what's connected to what, or am I just being OCD about my pretty drawing?   Is there a tool that I can use on the server to definitively find out what is connected to what?  

And how can I tell what security is in place?  Is that administered through an OS level admin tool, or is that done at the routers?  The routers are Linksys.

I'd like to be able to do administration remotely; is Remote Desktop to the server the best way to do that?

What sort of basic maintenance or watchdogging should I be doing in general to make sure things continue to go smoothly?

Is there a good webpage where I can go to get a good understanding of all of this, or a book that someone can recommend?  Obviously I have a lot to learn and need to get up to speed quickly.  So I'd prefer to learn what applies to my current situation, without too much interesting but not applicable information . . . :-)

(I know this is a lot of questions in one, but it seemed silly to re-explain the situation and post each question separately.  If one in particular is a big question and should be separated out, let me know.)

Question by:tnelson217
1 Comment
LVL 15

Accepted Solution

Yan_west earned 2000 total points
ID: 16313422
"and there are two routers, they are what I would call daisy chained, not sure if that's correct terminology."

Are you sure these arent switches? Switches are made to provide connectivity to workstations. All network device get in there.. doing a network diagram is a very good idea, especially if you don't know much about your topology. It'S a good excersice.

Remote desktop: perfect for remove administration. you don't need anything else.

Security: divided in multiple categories.

1-firewall (the linksys in your case) has to be administered via a web browser. Type in the IP of your router in your browser, and log in. If you have a wireless router, you have to be extra carefull, read http://geeksaresexy.blogspot.com/2006/01/securing-your-home-wireless-network.html

2-Anti-virus: be sure that all stations have anti-viruses. A centrally managed solution is the best if you have multiple PCs. I use symantec corporate edition. http://www.symantec.com/Products/enterprise?c=prodinfo&refId=805
It can be centrally managed via a console on your server.

3-Patch management.
Read : http://geeksaresexy.blogspot.com/2005/12/microsoft-windows-security-for.html
AND  : http://geeksaresexy.blogspot.com/2005/12/taking-patch-management-to-next-level.html

(All of these were written by me :) )


Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Nslookup is a command line driven utility supplied as part of most Windows operating systems that can reveal information related to domain names and the Internet Protocol (IP) addresses associated with them. In simple terms, it is a tool that can …
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

873 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question