Network Implementation

Download Report

Transcript Network Implementation

Network Implementation
Installing the Network
 Configure your network
 You have to decide how to lay out your
physical location.
 You have to choose between several different
network topologies , and some work better
than others depending on the situation
 Administrative duties that need to be
performed for your network to operate






Setting up administrative and test accounts
Passwords
IP addresses
IP configurations
Connectivity requirements
Necessary software
Network administrator
 Make sure that the clients on your network
can communicate with one another at all
times
 People who are using the network won’t
be interrupted during working hours
 Responsible for the security of the data,
the efficiency of the network, and other
aspects such as printing, sharing of files,
and e-mail.
Protocols
 Communication on a computer network is
accomplished by the use of protocols
 One of the most widely adopted standards
in the computer industry is the TCP/IP
protocol
 An easy way to think of protocols is to
consider them as a language
Standard Operating Procedures
(SOPs)
 The practices that you follow to enable
your network to run smoothly and
efficiently.
 These typically consist of backing up the
data on the network
 Making sure everyone can communicate
 Fixing any problem that may arise at a
moment’s notice.
Administrative and Test
Accounts
 The network administrator holds the keys
to the network castle
 The person who holds the Administrator
account has complete, unrestricted access
to all of the files, folders, and shares on
the network.
 He has complete power over the security
of the network.
Administrator account
 Limit access to the Administrator account
to those who have a justifiable need for
the account
 Rename the Administrator account to
something other than “Administrator.”
 Use a password that is difficult to break
Test account
 A test account is an account with normal
rights within the network.
 If you used an administrative account to
make the change, then you should use a
test account to test your changes
 This practice is especially important when
making changes to file and directory
permissions
Passwords
 Passwords are another form of computer
security to ensure that those who aren’t
supposed to access certain files on the network
don’t.
 Passwords aren’t a fail-safe method of securing
your network, but if they are implemented and
enforced correctly, they can impose a level of
security that you should feel comfortable with.
 A strong password is a password that is difficult
to “crack” or break in to.
TCP/IP
 TCP/IP (Transmission Control Protocol/Internet
Protocol) is an industry-standard suite of
protocols designed for local and wide area
networking.
 TCP/IP was developed in 1969, in a Defense
Advanced Research Projects Agency (DARPA)
research project on network interconnection.
 Formerly a military network, this global area
network has exploded and is now referred to as
the Internet.
Advantages of the TCP/IP
 It is the backbone of the Internet. If you need to




connect to the Internet, you will need TCP/IP.
It is routable. This means that you can talk to
other networks through routers.
It is very popular. Think of all of the computers
on the Internet.
Some applications need TCP/IP to run.
It provides connectivity across operating
systems and hardware platforms. Windows NT
can use an FTP client to access a UNIX
workstation or server.
Advantages of the TCP/IP
 It provides Simple Network Management
Protocol (SNMP) support, which is used to
troubleshoot problems on the network.
 It provides Dynamic Host Configuration
Protocol (DHCP) support, which is used
for Dynamic IP addressing.
 It provides Windows Internet Naming
Service (WINS) support, which resolves
Windows NetBios names on the network.
IP Configurations
 IP address
 An IP address is a 32-bit network address that
identifies a computer on a network. An IP
address is made up of a network ID and a
host ID.
 An IP address is a four-octet address.
Example. 204.22.120.3
 Subnet mask
 A subnet mask separates the network ID from the
host ID. This can break down an individual IP address
into different and separate logical networks or
subnets.
 Default gateway
 A default gateway is actually a router that is used to
send packets to remote networks. The default
gateway that is configured will receive a packet from
your computer and route the packet to its correct
destination. Without a default gateway configured,
your computer cannot communicate with any remote
networks.
Domain Name System
 A DNS Service is used to map IP
addresses to fully qualified domain names
(FQDNs). This form of name resolution is
commonly used on the Internet to map IP
addresses to popular web sites.
Windows Internet Naming Service
 A WINS Service also provides name
resolution for computers, but does so only
for Windows computers and is normally
“Microsoft centric.” A WINS Service maps
IP addresses to NetBIOS names.
MAC address
 A MAC address is the physical network address
of a computer’s network interface card.
 A MAC address is a 12-letter hexadecimal
address that is broken up into two segments.
 The first six hex letters identify the vendor of the
network card; the last six hex letters are the
serial number that identifies the computer.
Dynamic Host Configuration
Protocol
 DHCP is used to automatically allocate
TCP/IP address information to a computer
that is “DHCP enabled.” This practice
reduces the amount of administration
necessary for large networks
Host name
 A host name or computer name uniquely
identifies the computer on the network.
 A host name or Fully Qualified Domain
Name will uniquely identify a computer on
the network or Internet, but a NetBIOS
name is the computer name that is
specified by the network administrator.
 These two names can be different, but
unless changed, the Host name defaults to
the NetBIOS computer name.
Name Resolution
 Computers communicate with each other
by using network addresses, but people
tend to want to communicate by using
computer names
 It is much easier to remember a computer
name than a set of four different numbers.
Name Resolution
 The two main options associated with name
resolution on computer networks are Domain
Name System (DNS) and Windows Internet
Naming Service (WINS).
 For name resolution on Windows networks,
WINS resolves NetBIOS names to TCP/IP
addresses.
 For computers that use host names, DNS
resolves fully qualified domain names (FQDNs)
to TCP/IP addresses.
WINS
 Resolve NetBIOS names to IP addresses.
 The Windows Internet Naming Service
(WINS) was designed to eliminate the
need for broadcasts to resolve NetBIOS
names to IP addresses and to provide a
dynamic database that maintains NetBIOS
names to IP address mappings
DNS
 DNS (Domain Name System) maps
TCP/IP addresses to computer names
Cables
 10BaseT- Flexible, uses RJ-45
connector,100 meters/328 feet
 10Base2 - Less flexible than 10BaseT,
uses a BNC connector to hook computers
together, Must be terminated on one
end.185 meters/607 feet
 10Base5 - Rigid, does not bend well
around corners, Not used too often; AUI
connector,1640 feet
 Fiber optic - Does not do well in tight
changes of redirection, Carries data
extreme distances, Easily broken, fragile,
2 kilometers