Saturday, 24 November 2012

Plan and Document an Ethernet Network


Plan and Document an Ethernet Network

Most local networks are based on Ethernet technology. This technology is both fast and efficient when used in a properly designed and constructed network. The key to installing a good network is planning before the network is actually built.

A network plan starts with the gathering of information about how the network will be used. This information includes:
The number and type of hosts to be connected to network
The applications to be used
Sharing and Internet connectivity requirements
Security and privacy considerations
Reliability and uptime expectations
Connectivity requirements including, wired and wireless
There are many considerations that must be taken into account when planning for a network installation. The logical and physical topology maps of the network need to be designed and documented before the networking equipment is purchased and the hosts are connected. Some things to consider include:
 Physical environment where the network will be installed:
Temperature control: all devices have specific ranges of temperature and humidity requirements for proper operation
Availability and placement of power outlets
 Physical configuration of the network:
Physical location of devices such as routers, switches, and hosts
How all devices are interconnected
Location and length of all cable runs
Hardware configuration of end devices such as hosts and servers

Logical configuration of the network:
Location and size of broadcast and collision domains
IP addressing scheme
Naming scheme
Sharing configuration
Permissions
 Prototypes
Once the network requirements are documented, and the physical and logical topology maps created, the next step in the implementation process is to test the network design. One of the ways to test a network design is to create a working model, or prototype, of the network.

Prototyping is essential as networks grow in size and complexity. A prototype allows a network administrator to test whether or not the planned network will operate as expected, before money is spent on equipment and installation. Documentation should be maintained on all aspects of the prototyping process.
 Various tools and techniques are available for network prototyping; this includes real equipment set up in a lab environment, modeling and simulation tools. Packet Tracer is one example of a simulation and modeling tool that can be used for prototyping.

Multi function Device

Most home and small business networks do not require high-volume devices used in large business environments; smaller scale devices may well be suitable. However, the same functionality of routing and switching is required. This need has led to the development of products that have the functionality of multiple network devices, such as a router with switching functionality and a wireless access point. For the purpose of this course, multi-function devices will be referred to as integrated routers. Integrated routers can range from small devices designed for home office and small business applications to more powerful devices that can support enterprise branch offices.

An integrated router is like having several different devices connected together. For example, the connection between the switch and the router still occurs, but it occurs internally. When a broadcast is received on a switch port, the integrated router forwards the broadcast to all ports including the internal router connection. The router portion of the integrated router stops the broadcasts from going any further.

There are low-cost multi-function devices available for home and small business networks that offer integrated routing, switching, wireless and security capabilities. An example of this type of integrated router is a Linksys wireless router. They are simple in design and do not typically have separate components. In the event of a failure, it is not possible to replace any single failed component. As such, they create a single point of failure, and are not optimized for any one function.

Another example of an integrated router is the Cisco integrated services router or ISR. The Cisco ISR product family offers a wide range of products, including those designed for small office and home office environments as well as those designed for larger networks. Many of the ISRs offer modularity and have separate components for each function, such as a switch component and a router component. This enables individual components to be added, replaced and upgraded as necessary.

Connecting the Linksys Router
All devices connected to the switch ports should be in the same broadcast domain. This means that all devices must have an IP address from the same network. Any device that has a different network portion within the IP address will not be able to communicate.

Additionally, Microsoft Windows makes use of computer names to identify other devices on the network. It is important to use these names as well as all IP address information in the planning and documentation to assist in future troubleshooting.

To display the current IP configuration in Microsoft Windows, use the command ipconfig. More detailed information, including host name, is available with the ipconfig /all. Document all information from the connection and configuration process.

Once hosts are communicating across the network, it is important to document network performance. This is known as determining the baseline for the network, and is used as an indication of normal operations. When comparing future network performance with the baseline, it can indicate if possible issues exist.

Sharing Resources


One of the most common purposes of networking is to share resources such as files and printers. Windows XP enables remote users to access a local machine and its resources through Sharing. It is important to consider security issues, and to assign specific permissions to shared resources.

By default, Windows XP uses a process known as Simple File Sharing. With Simple File Sharing, specific users and groups cannot be prevented from accessing shared files.

Simple File Sharing can be disabled so that more specific security access levels can be assigned. When this is done, the following permissions are available to assign to resources:
Full Control
Modify
Read & Execute
List Folder Contents
Read
Write

When a user accesses a file on a remote device, Windows Explorer allows the user to map a drive to a remote folder or resource. This maps a specific drive letter, for example M:, to the remote resource. This enables the user to treat the resource as though it was locally connected.







No comments:

Post a Comment

bilalhoney123@gmail.com

bilalhoney123@gmail.com