Transcript

Chapter 5Chapter 5

Analyzing Hardware and Network Requirements

5

Learning ObjectivesLearning Objectives

• Analyze: Hardware systems used in organizations Local area networks and bandwidth Wide area networks and bandwidth Network management User access, productivity, and

performance issues Network and Internet security

5

Analyzing Hardware Analyzing Hardware SystemsSystems

• Workstations

• Host computers

• Network devices

5

WorkstationsWorkstations

• Elements to assess Thin-clients and terminals Speed of workstation network interface cards

(NICs) Speed of the expansion slot Basic input/output system (BIOS)

• Compile data into a table that integrates the information with your list of operating systems

5

WorkstationsWorkstations

5

Host ComputersHost Computers

• Can include any computer to which others connect for information or to run programs

5

Host ComputersHost Computers

5

Network DevicesNetwork Devices

• Print servers

• Repeaters

• Active hubs

• Passive hubs

• Bridges

• Routers

• Brouters

• Switches

• Multiplexers

• Channel service units (CSUs)

• Data service units (DSUs)

• Access servers

• RAID or RAID arrays

• CD-ROM arrays

• Packet assembler/ disassemblers (PADs)

5

Network DevicesNetwork Devices

5

Network Devices Network Devices

5

Local Area Network Local Area Network Systems and BandwidthSystems and Bandwidth

• Using network diagrams

• Analyzing LAN transmission methods

• Analyzing protocols

• Analyzing IP addresses, subnets, and subnet masks

• Analyzing DNS and WINS servers

• Analyzing bandwidth

5

Information in a LAN Information in a LAN DiagramDiagram

• Network backbone

• Servers, including locations and IP addresses

• Host computers, including locations and IP addresses

• Workstations, including locations and IP addresses, subnet masks, and subnet address information

• Network devices, including locations and IP addresses

continued

5

Information in a LAN Information in a LAN DiagramDiagram

• Telecommunications links, including copper, fiber-optic, and wireless

• Internet connectivity

• Intranets

• Remote links

• Building locations

• Cable types

• Wireless communication links and frequencies

5

A General Network DiagramA General Network Diagram

5

Using Network Management Using Network Management SoftwareSoftware

5

Analyzing LAN Analyzing LAN Transmission MethodsTransmission Methods

• Ethernet

• Token ring

• Fiber Distributed Data Interface (FDDI)

5

EthernetEthernet

• Uses the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) access method for data transmission on a network

• Can use a bus or physical star layout

5

Token RingToken Ring

• Developed by IBM in the 1970s; remains a primary LAN technology

• Uses a physical star topology along with the logic of a ring topology

• Each node is joined through a multistation access unit (MAU)

• Packet travels from node to node as though there were no starting or ending point

5

FDDIFDDI

• Developed in the mid-1980s to provide higher-speed data communications

• Uses fiber-optic cable as the communications medium

• Uses timed token access method

• Capable of a 100 Mbps transfer rate using a dual-ring topology

5

Analyzing ProtocolsAnalyzing Protocols

• Transmission Control Protocol/Internet Protocol (TCP/IP) Key protocols, used for network and Internet

communications, combined into a suite

• NetBIOS Extended User Interface (NetBEUI)

• Internet Packet Exchange/Sequence Packet Exchange (IPX/SPX)

• AppleTalk

• Systems Network Architecture (SNA) and Data Link Control (DLC)

5

Transmission Control Transmission Control Protocol (TCP)Protocol (TCP)

• Establishes communication sessions between networked software application processes

• Provides for reliable end-to-end delivery of data by controlling data flow

• Essential functions Monitors for session requests Establishes sessions with other TCP nodes Transmits and receives data Closes transmission sessions

5

Internet Protocol (IP) Internet Protocol (IP)

• Used in combination with TCP or UDP to enable packets to reach a destination on a local or remote network by using dotted decimal addressing

• Designed to provide for: Data transfer Packet addressing Packet routing Packet fragmentation Simple detection of packet errors

5

NetBEUINetBEUI

• Developed by IBM in the mid-1980s

• Incorporates NetBIOS for communications across a network

• Used on early, small Microsoft-based networks

5

IPX/SPXIPX/SPX

• Internet Packet Exchange Developed by Novell for use with its

NetWare file server operating system Can be routed A “chatty” protocol

• Sequence Packet Exchange A Novell protocol used for network

transport for application software where there is a particular need for data reliability

5

AppleTalkAppleTalk

• A peer-to-peer protocol used on networks for communication between Macintosh computers

• AppleTalk Phase II Handles an increased number of

networked computers Interoperable with large heterogeneous

networks that host multiple protocols

5

SNA and DLCSNA and DLC

• Systems Network Architecture A layered communications protocol used

by IBM for communication between IBM mainframe computers and terminals

• Data Link Control A protocol designed for communication

with an IBM mainframe or minicomputer Set up to use SNA communications

5

Documenting Protocols in a Documenting Protocols in a Network DiagramNetwork Diagram

5

Analyzing IP Addresses, Analyzing IP Addresses, Subnets, and Subnet MasksSubnets, and Subnet Masks

• Version of IP that is used, IPv4 or IPv6

• Whether IP addresses are assigned dynamically or statically

• IP address ranges that are used (or scopes when DHCP is in use)

• Subnets that are used and their locations

• Reasons why subnets are used

5

New Features of IPv6New Features of IPv6

• 128-bit address capability

• A single address can be associated with multiple network interfaces

• Address autoconfiguration and CIDR addressing

• 40-byte header instead of IPv4’s 20-byte header (for more services)

• New IP extension headers can be implemented for special needs, including more routing and security options

5

Analyzing DNS andAnalyzing DNS andWINS ServersWINS Servers

• Domain Name System (DNS) Resolves IP addresses to computer names Typically two zones of data

• Forward lookup zone• Reverse lookup zone

• Windows Internet Naming Service (WINS) Used with DNS Server to resolve IP addresses

and computer names on networks in which NetBIOS applications are still in use

5

Analyzing DNS on a Analyzing DNS on a NetworkNetwork

• Operating system of the DNS server

• Location of DNS servers on the network

• Placement of primary and secondary (backup) DNS servers

• Information in forward and reverse lookup zones

• Whether or not DNS zones are automatically updated when a new device is connected

5

DNS Forward Lookup ZoneDNS Forward Lookup Zone

5

Analyzing the Use ofAnalyzing the Use ofWINS ServersWINS Servers

• Reason why WINS is used, such as for pre-Windows 2000 object naming

• NetBIOS naming conventions used on a network

• Location of WINS servers

5

Analyzing BandwidthAnalyzing Bandwidth

• Bandwidth Transmission capacity of a communication

medium Typically measured in bits per second (bps, for

data transmissions) or hertz (Hz, for combined data, voice, and video transmissions in wireless communications)

Related to the capacity of the communication medium and to the transmission method

5

Analyzing BandwidthAnalyzing Bandwidth

5

Analyzing BandwidthAnalyzing Bandwidth

• Obtain or create network diagrams showing information about network layout (topology)

• Determine LAN transmission methods (Ethernet, token ring, FDDI)

• Determine LAN protocols (TCP/IP, IPX/SPX, NetBEUI, AppleTalk, SNA, DLC)

continued

5

Analyzing BandwidthAnalyzing Bandwidth

• Determine IP addressing convention, including subnet masks

• Determine how IP subnets are used

• Assess the deployment of DNS, WINDS, and DHCP servers

• Determine Ethernet, token ring, FDDI, and wireless bandwidths of specific links

5

Wide Area Network Systems Wide Area Network Systems and Bandwidthand Bandwidth

• WAN transmission methods

• WAN technologies transmitted over other WANs

• WAN bandwidth

5

Analyzing WAN Analyzing WAN Transmission MethodsTransmission Methods

• Modem communications over regular phone lines

• X.25

• Frame relay

• ISDN (Integrated Services Digital Network)

• SMDS (switched megabit data service)

• DSL (digital subscriber line)

• ATM (asynchronous transfer mode)

• SONET (synchronous optical network)

5

X.25 WAN ArchitectureX.25 WAN Architecture

5

Frame Relay WAN Frame Relay WAN ArchitectureArchitecture

5

DSL WAN ArchitectureDSL WAN Architecture

5

Analyzing Protocol Support Analyzing Protocol Support Over WANsOver WANs

• Many WAN technologies enable other LAN and WAN technologies to operate through them

• Determine if a WAN technology is being used over another WAN technology

5

Analyzing WAN BandwidthAnalyzing WAN Bandwidth

• Determine which WAN technologies are in use, such as modem communications, X.25, frame relay, ISDN, SMDS, DSL, ATM, and SONET

• Determine if one WAN technology is also transporting another WAN technology, such as SONET transporting ATM

• Determine the bandwidth of all WAN links

5

ISDN Primary Rate Interface ISDN Primary Rate Interface ArchitectureArchitecture

5

DSL BandwidthDSL Bandwidth

5

SONET BandwidthSONET Bandwidth

5

Analyzing Network Analyzing Network ManagementManagement

• Determine if network management protocols are used, such as SNMP or CMIP

• Determine which stations act as network agents and network management stations (NMS)

• Use the NMS and network management software to your advantage for gathering information about how the network is set up

continued

5

Analyzing Network Analyzing Network ManagementManagement

• Find out what network management software is used and determine how it is used to manage a network

• Assess the security in place for SNMP or CMIP

• Determine if RMON is used

5

RMON ArchitectureRMON Architecture

5

Analyzing User Access, Produc-Analyzing User Access, Produc-tivity, and Performance Issuestivity, and Performance Issues

• Determine if users can be more productive and have better access by upgrading their computers or workstation operating systems

• Assess if most effective protocols are in use and if some protocols can be retired, such as IPX/SPX or NetBEUI

• Assess whether network bandwidth is adequate for the type of work and traffic on specific network segments

continued

5

Analyzing User Access, Produc-Analyzing User Access, Produc-tivity, and Performance Issuestivity, and Performance Issues

• Determine if the network access order can be tuned on some workstations, such as those running Windows NT 4.0 or Windows 2000, when multiple protocols are in use

• Assess whether the network access method is appropriate for anticipated growth in user access

5

Analyzing Network and Analyzing Network and Internet SecurityInternet Security

• Determine what account security policies are implemented on existing servers

• Determine if Kerberos and certificate security is used or if there are plans to use it

• Assess remote access policies for RAS and VPN servers

• Assess the use of encryption and authentication on all servers and hosts

continued

5

Analyzing Network and Analyzing Network and Internet SecurityInternet Security

• Determine how routers, proxy servers, and firewalls are used for network security, including the location of those devices

• Assess what IP- and account-based restrictions are used for security on the Web, RAS, VPN, and other servers

5

Restricting AccessRestricting Accessto a Web Siteto a Web Site

5

Chapter SummaryChapter Summary

• Analyzing hardware systems Workstations Host computers Network devices

• Local area network systems and bandwidth Analyzing LAN transmission methods Analyzing protocols Analyzing IP addresses, subnets, and subnet masks Analyzing DNS and WINS servers Analyzing bandwidth

continued

5

Chapter SummaryChapter Summary

• Wide area network systems and bandwidth Analyzing WAN transmission methods Analyzing protocol support over WANs Analyzing WAN bandwidth

• Analyzing network management

• Analyzing user access, productivity, and performance issues

• Analyzing network and Internet security

top related