Plan and
Document an Ethernet Network
Most local
networks are based on Ethernet technology. This technology is both fast and
efficient when used in a properly designed and constructed network. The key to
installing a good network is planning before the network is actually built.
A network plan
starts with the gathering of information about how the network will be used.
This information includes:
The number
and type of hosts to be connected to network
The
applications to be used
Sharing and
Internet connectivity requirements
Security and
privacy considerations
Reliability
and uptime expectations
Connectivity
requirements including, wired and wireless
There are
many considerations that must be taken into account when planning for a network
installation. The logical and physical topology maps of the network need to be
designed and documented before the networking equipment is purchased and the
hosts are connected. Some things to consider include:
Physical
environment where the network will be installed:
Temperature
control: all devices have specific ranges of temperature and humidity
requirements for proper operation
Availability
and placement of power outlets
Physical
configuration of the network:
Physical
location of devices such as routers, switches, and hosts
How all
devices are interconnected
Location and
length of all cable runs
Hardware
configuration of end devices such as hosts and servers
Logical
configuration of the network:
Location and
size of broadcast and collision domains
IP
addressing scheme
Naming
scheme
Sharing
configuration
Permissions
Prototypes
Once the
network requirements are documented, and the physical and logical topology maps
created, the next step in the implementation process is to test the network
design. One of the ways to test a network design is to create a working model,
or prototype, of the network.
Prototyping
is essential as networks grow in size and complexity. A prototype allows a
network administrator to test whether or not the planned network will operate
as expected, before money is spent on equipment and installation. Documentation
should be maintained on all aspects of the prototyping process.
Various
tools and techniques are available for network prototyping; this includes real
equipment set up in a lab environment, modeling and simulation tools. Packet
Tracer is one example of a simulation and modeling tool that can be used for
prototyping.
Multi function
Device
Most home
and small business networks do not require high-volume devices used in large
business environments; smaller scale devices may well be suitable. However, the
same functionality of routing and switching is required. This need has led to
the development of products that have the functionality of multiple network
devices, such as a router with switching functionality and a wireless access point.
For the purpose of this course, multi-function devices will be referred to as
integrated routers. Integrated routers can range from small devices designed
for home office and small business applications to more powerful devices that
can support enterprise branch offices.
An
integrated router is like having several different devices connected together.
For example, the connection between the switch and the router still occurs, but
it occurs internally. When a broadcast is received on a switch port, the integrated
router forwards the broadcast to all ports including the internal router
connection. The router portion of the integrated router stops the broadcasts
from going any further.
There are
low-cost multi-function devices available for home and small business networks
that offer integrated routing, switching, wireless and security capabilities.
An example of this type of integrated router is a Linksys wireless router. They
are simple in design and do not typically have separate components. In the event
of a failure, it is not possible to replace any single failed component. As
such, they create a single point of failure, and are not optimized for any one
function.
Another
example of an integrated router is the Cisco integrated services router or ISR.
The Cisco ISR product family offers a wide range of products, including those
designed for small office and home office environments as well as those
designed for larger networks. Many of the ISRs offer modularity and have
separate components for each function, such as a switch component and a router
component. This enables individual components to be added, replaced and
upgraded as necessary.
Connecting
the Linksys Router
All devices
connected to the switch ports should be in the same broadcast domain. This
means that all devices must have an IP address from the same network. Any
device that has a different network portion within the IP address will not be
able to communicate.
Additionally,
Microsoft Windows makes use of computer names to identify other devices on the
network. It is important to use these names as well as all IP address
information in the planning and documentation to assist in future
troubleshooting.
To display
the current IP configuration in Microsoft Windows, use the command ipconfig.
More detailed information, including host name, is available with the ipconfig
/all. Document all information from the connection and configuration process.
Once hosts
are communicating across the network, it is important to document network
performance. This is known as determining the baseline for the network, and is
used as an indication of normal operations. When comparing future network
performance with the baseline, it can indicate if possible issues exist.
Sharing Resources
One of the most common purposes of networking is to share
resources such as files and printers. Windows XP enables remote users to access
a local machine and its resources through Sharing. It is important to consider
security issues, and to assign specific permissions to shared resources.
By default, Windows XP uses a process known as Simple File
Sharing. With Simple File Sharing, specific users and groups cannot be
prevented from accessing shared files.
Simple File Sharing can be disabled so that more specific
security access levels can be assigned. When this is done, the following
permissions are available to assign to resources:
Full Control
Modify
Read & Execute
List Folder Contents
Read
Write
When a user accesses a file on a remote device, Windows
Explorer allows the user to map a drive to a remote folder or resource. This
maps a specific drive letter, for example M:, to the remote resource. This
enables the user to treat the resource as though it was locally connected.
No comments:
Post a Comment