Professional Documents
Culture Documents
A computer network is a group of interconnected computers. Networks may be classified according to a wide variety of characteristics. A computer network is a collection of computers and devices connected to each other. The network allows computers to communicate with each other and share resources and information. The Advanced Research Projects Agency (ARPA) designed "Advanced Research Projects Agency Network" (ARPANET) for the United States Department of Defense. It was the first computer network in the world in late 1960s and early 1970s.
The Telecommunication Standardization Sector (ITU-T) coordinates standards for telecommunications on behalf of the International Telecommunication Union (ITU) and is based in Geneva, Switzerland.
Ethernet uses physical wiring to connect devices. Frequently deployed devices include hubs, switches, bridges and/or routers. Wireless LAN technology is designed to connect devices without wiring. These devices use radio waves or infrared signals as a transmission medium. ITU-T G.hn technology uses existing home wiring (coaxial cable, phone lines and power lines) to create a high-speed (up to 1 Gigabit/s) local area network.
Network classification
The following list presents categories used for classifying networks.
Scale
Networks are often classified as Local Area Network (LAN), Wide Area Network (WAN), Metropolitan Area Network (MAN), Personal Area Network (PAN), Virtual Private Network (VPN), Campus Area Network (CAN), Storage Area Network (SAN), etc. depending on their scale, scope and purpose. Usage, trust levels and access rights often differ between these types of network - for example, LANs tend to be designed for internal use by an organization's internal systems and employees in individual physical locations (such as a building), while WANs may connect physically separate parts of an organization to each other and may include connections to third parties.
Connection method
Computer networks can also be classified according to the hardware and software technology that is used to interconnect the individual devices in the network, such as Optical fiber, Ethernet, Wireless LAN, HomePNA, Power line communication or G.hn.
The HomePNA Alliance (formerly the Home Phoneline Networking Alliance, also known as HPNA) is an incorporated non-profit industry association of companies that develops and standardizes technology for home networking over the existing coaxial cables and phone wires within the home. The HomePNA promoter companies that set the course for the organization are AT&T, 2Wire, CopperGate, Motorola, Cisco (Scientific-Atlanta), Sunrise Telecom and K-Micro.[1] HomePNA creates industry specifications which it then standardizes under the International Telecommunication Union (ITU), a leading global standards body. HomePNA also promotes the technology, tests, and certifies member products as HomePNA compliant. Power line communication or power line carrier (PLC), also known as Power line Digital Subscriber Line (PDSL), mains communication, power line telecom (PLT), or power line networking (PLN), is a system for carrying data on a conductor also used for electric power transmission. Broadband over Power Lines (BPL) uses PLC by sending and receiving information bearing signals over power lines to provide access to the Internet.
Network topology
Computer networks may be classified according to the network topology upon which the network is based, such as bus network, star network, ring network, mesh network, star-bus network, tree or hierarchical topology network. Network topology signifies the way in which devices in the network see their logical relations to one another. The use of the term "logical" here is significant. That is, network topology is independent of the "physical" layout of the network. Even if networked computers are physically placed in a linear arrangement, if they are connected via a hub, the network has a Star topology, rather than a bus topology. In this regard the visual and operational characteristics of a network are distinct; the logical network topology is not necessarily the same as the physical layout. Networks may be classified based on the method of data used to convey the data, these include digital and analog networks.
G.hn is the common name for the "next generation" home network technology standard being developed under the International Telecommunication Union (ITU) and promoted by the HomeGrid Forum and many other organizations.[1] Because it supports networking over power lines, phone lines and coaxial cables with data rates up to 1 Gbit/s[2], G.hn is intended to be a universal standard for home networking. The first Recommendation for G.hn is G.9960, which received consent on Dec 12th 2008. The work is being done in the ITU-T Telecommunication Standardization Sector, Study Group 15, Question 4. Over 20 companies are participating regularly representing a broad cross section of the communications industry including some of the worlds largest telephone companies, major communication equipment companies and some of the leading home networking technology companies.
Types of networks
Below is a list of the most common types of computer networks in order of scale.
Internetwork
Internetworking involves connecting two or more distinct computer networks or network segments via a common routing technology. The result is called an internetwork (often shortened to internet). Two or more networks or network segments connected using devices that operate at layer 3 (the 'network' layer) of the OSI Basic Reference Model, such as a router. Any interconnection among or between public, private, commercial, industrial, or governmental networks may also be defined as an internetwork. In modern practice, the interconnected networks use the Internet Protocol. There are at least three variants of internetwork, depending on who administers and who participates in them:
Participants in the Internet use a diverse array of methods of several hundred documented, and often standardized, protocols compatible with the Internet Protocol Suite and an addressing system (IP Addresses) administered by the Internet Assigned Numbers Authority and address registries. Service providers and large enterprises exchange information about the reachability of their address spaces through the Border Gateway Protocol (BGP), forming a redundant worldwide mesh of transmission paths.
Intranets and extranets may or may not have connections to the Internet. If connected to the Internet, the intranet or extranet is normally protected from being accessed from the Internet without proper authorization. The Internet is not considered to be a part of the intranet or extranet, although it may serve as a portal for access to portions of an extranet.
Intranet
An intranet is a set of networks, using the Internet Protocol and IP-based tools such as web browsers and file transfer applications, that is under the control of a single administrative entity. That administrative entity closes the intranet to all but specific, authorized users. Most commonly, an intranet is the internal network of an organization. A large intranet will typically have at least one web server to provide users with organizational information.
Repeaters
A repeater is an electronic device that receives a signal and retransmits it at a higher power level, or to the other side of an obstruction, so that the signal can cover longer distances without degradation. In most twisted pair Ethernet configurations, repeaters are required for cable which runs longer than 100 meters.
Extranet
An extranet is a network or internetwork that is limited in scope to a single organization or entity but which also has limited connections to the networks of one or more other usually, but not necessarily, trusted organizations or entities (e.g., a company's customers may be given access to some part of its intranet creating in this way an extranet, while at the same time the customers may not be considered 'trusted' from a security standpoint). Technically, an extranet may also be categorized as a CAN, MAN, WAN, or other type of network, although, by definition, an extranet cannot consist of a single LAN; it must have at least one connection with an external network.
Hubs
A hub contains multiple ports. When a packet arrives at one port, it is copied unmodified to all ports of the hub for transmission. The destination address in the frame is not changed to a broadcast address.
Bridges
A network bridge connects multiple network segments at the data link layer (layer 2) of the OSI model. Bridges do not promiscuously copy traffic to all ports, as hubs do, but learn which MAC addresses are reachable through specific ports. Once the bridge associates a port and an address, it will send traffic for that address only to that port. Bridges do send broadcasts to all ports except the one on which the broadcast was received. Bridges learn the association of ports and addresses by examining the source address of frames that it sees on various ports. Once a frame arrives through a port, its source address is stored and the bridge assumes that MAC address is associated with that port. The first time
Internet
The Internet is a specific internetwork. It consists of a worldwide interconnection of governmental, academic, public, and private networks based upon the networking technologies of the Internet Protocol Suite. It is the successor of the Advanced Research Projects Agency Network (ARPANET) developed by DARPA of the U.S. Department of Defense. The Internet is also the communications backbone underlying the World Wide Web (WWW). The 'Internet' is most commonly spelled with a capital 'I' as a proper noun, for historical reasons and to distinguish it from other generic internetworks.
that a previously unknown destination address is seen, the bridge will forward the frame to all ports other than the one on which the frame arrived. Bridges come in three basic types: 1. Local bridges: Directly connect local area networks (LANs) 2. Remote bridges: Can be used to create a wide area network (WAN) link between LANs. Remote bridges, where the connecting link is slower than the end networks, largely have been replaced by routers. 3. Wireless bridges: Can be used to join LANs or connect remote stations to LANs.
While the specific job description for network administrators will be slightly different for each organization, common responsibilities include:
Design, install and evaluate network Perform and manage regular backups Provide technical documentation Manage users and provide user support Monitoring and troubleshooting assistance Security management and virus prevention
Switches
A switch is a device that forwards and filters OSI layer 2 datagrams (chunk of data communication) between ports (connected cables) based on the MAC addresses in the packets.[6] This is distinct from a hub in that it only forwards the packets to the ports involved in the communications rather than all ports connected. Strictly speaking, a switch is not capable of routing traffic based on IP address (OSI Layer 3) which is necessary for communicating between network segments or within a large or complex LAN. Some switches are capable of routing based on IP addresses but are still called switches as a marketing term. A switch normally has numerous ports, with the intention being that most or all of the network is connected directly to the switch, or another switch that is in turn connected to a switch.[7] Switch is a marketing term that encompasses routers and bridges, as well as devices that may distribute traffic on load or by application content (e.g., a Web URL identifier). Switches may operate at one or more OSI model layers, including physical, data link, network, or transport (i.e., end-to-end). A device that operates simultaneously at more than one of these layers is called a multilayer switch. Overemphasizing the ill-defined term "switch" often leads to confusion when first trying to understand networking. Many experienced network designers and operators recommend starting with the logic of devices dealing with only one protocol level, not all of which are covered by OSI. Multilayer device selection is an advanced topic that may lead to selecting particular implementations, but multilayer switching is simply not a real-world design concept.
Routers
Routers are networking devices that forward data packets between networks using headers and forwarding tables to determine the best path to forward the packets. Routers work at the network layer. Planning and design Planning for your network installation is one of the most important steps. Before you begin designing the network you need to identify what your company needs are. This will help guide you through the process and make sure you don't overlook any important details. Here are a few important points that you should consider when designing your network.
Planning for a network installation is one of the most important steps. Before you start designing the network you need to identify what the company needs are. This will help guide you through the process and make sure you don't overlook any important details. A few important points that you should consider:
Network administration
Network administration is an arduous task. The administrator's responsibilities often involve many different aspects and may include such tasks as network design, management, troubleshooting, backup and storage, documentation, security and virus prevention as well as managing users.
1. 2.
3. 4. 5.
Security. What type of data will be stored on the servers and which workstations will require secure connections to them in order to prevent others from obtaining access. Also consider creating access policies which will restrict access at sensitive areas. Splitting the network. I always allow up to 50 workstations max in one network in order to preserve the bandwidth and reduce broadcasts which can cause a lot of trouble, especially if the network is a busy one! Check your requirements and see if you can split the network into 2-3 networks and allow relevant networks to access the servers they require. You can also consider using VLANS, which could work quite well, depending on your needs. Firewall. If the network will have Internet access, or any type of access to other remote networks, I strongly suggest you consider a firewall or some type of packet filtering device to stop unwanted people from accessing local workstations, servers and other services which will be available. Connectivity. Make sure not to use any Hub in your network design. Switches are the most efficient communications devices when it comes to network connectivity. When planning to connect hosts, computers, devices to a switch, don't forget to allow enough room for future growth. Most of the times, network designers and systems administrators find themselves quickly running out of ports simply because they didn't foresee the network expanding!
A physical layout of the network shows the physical location of and the connections between devices participating on the network. In such diagrams, workstations are usually represented with small computer icons, servers with full tower cases, and switches and other similar devices are displayed as small rectangular boxes with their RJ-45 ports in the front (sometimes, switches are displayed without ports, depending on the angle at which we are viewing the network on the page). A logical layout shows all logical aspects of the network. This includes logical networks, assigned IP addresses to various hosts and devices, routing tables and a lot more. In logical diagrams, there is very little interest in the actual interfaces and physical cables, so these details are usually omitted. So why do we need all the above? Simple - for security, troubleshooting and management reasons. When a problem arises, I.E. a link is down, by simply looking at the physical layout, we are able to quickly identify where the problem is located, allowing us to quickly resolve it. Having a visual view of a logical and physical network also helps identify possible security problems. When an unwanted visitor tries to obtain access to highly sensitive information, in most cases he or she will create a map of the network to better understand where each security checkpoint (firewall or similar device) is installed and what access can be obtained. The above reason is also why these 'maps' are restricted to Administrators and Engineers who are responsible for the network. If they fall into the hands of 'enemy,' they can prove to be the most effective weapon against you!
Network design underlies the performance of your enterprise IP network. This four part guide by Cormac Long offers you a comprehensive roadmap to designing IP-based networks, from the basic principles involved to the more complex finishing touches. Network topology Topology is a term that refers the shape of the network and the layout of cabling from a bird's eye view, much as a floor plan identifies the layout of offices and hallways in a building. See which network topology is right for your network.
Topology is a term that refers the shape of the network and the layout of cabling from a bird's eye view, much as a floor plan identifies the layout of offices and hallways in a building. The topology is made up of LAN workstations, also called nodes. The lines between nodes represent cables. Junction boxes are used to interconnect the cables. Theoretically, any kind of cable medium could be wired together to create an infinite variety of network layouts. But, in fact, certain implementations of topology have become more popular while other implementations have simply never caught on. The Star topology is emerging as the most common network layout in use today. Each workstation is connected point-to-point to a single central location that is commonly referred to as a wiring closet.
Backup management
The network administrator is responsible for network backups as well as testing backup and disaster recovery processes. This is crucial for recovery from power or hardware failure, data and/or network problems, and physical disasters. Backup guidelines: In many ways, backups are the heart of any design of critical systems. Handled properly, they represent the last line of defense against just about any catastrophe. Even if your building or your entire city is wiped out, your business can be restored on other computers from properly generated and protected backup tapes. But there are several "if" conditions that must be satisfied for everything to work out properly and data to be recoverable. There are a number of basic backup guidelines. By keeping them in mind as you design your backup environment, you will make the best advantage of your backups, and they will serve you best when you need them: 1. 2. 3. 4. 5. 6. 7. 8. 9. Mirroring does not replace backups. The most common use of restores isn't after a catastrophe. Regularly test your ability to restore. Keep those tape heads clean. Beware of dirty tapes. Pay attention to Mean Time Between Failure (MTBF) numbers for tapes. Tapes decompose over time. Make two copies of critical tapes. Make sure you can still read old media.
Physical and logical network design A physical layout of the network shows the physical location of and the connections between devices participating on the network. In such diagrams, workstations are usually represented with small computer icons, servers with full tower cases, and switches and other similar devices are displayed as small rectangular boxes with their RJ-45 ports in the front (sometimes, switches are displayed without ports, depending on the angle at which we are viewing the network on the page).
A logical layout shows all logical aspects of the network. This includes logical networks, assigned IP addresses to various hosts and devices, routing tables and a lot more. In logical diagrams, there is very little interest in the actual interfaces and physical cables, so these details are usually omitted.
The amount of data that companies are producing is growing exponentially. The sheer quantity of data doesn't make it any less important to the company. So every bit needs to be backed up in case of an accidental deletion, a hardware failure or, as we have been reminded recently, an actual disaster. Everyone knows the data needs to be preserved, but how does an network administrator go about doing that without devoting all his time to backup management? It's definitely an issue that hasn't gone unnoticed among the many backup software companies. Backup software is a multimillion-dollar industry, and wading through the vendor rhetoric can be a challenge in and of itself. Here we take a look at the biggest backup management headaches and challenges for network administrators: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Shrinking backup window. Inability to force an enterprise-wide centralized backup policy. Inability to backup desktops and laptops confidently. Network bandwidth limitations. Rapidly growing data, and finding a place for it all. Tape management for recovery. Restoring quickly. Difficulty of backing up complex, heterogeneous environments. Remote management. Tape security.