Top Banner
Chapter 5 Chapter 5 Analyzing Hardware and Network Requirements
58
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Analyse Hardware and Network Requirements - DS Chap 5

Chapter 5Chapter 5

Analyzing Hardware and Network Requirements

Page 2: Analyse Hardware and Network Requirements - DS Chap 5

5

Learning ObjectivesLearning Objectives

• Analyze: Hardware systems used in organizations Local area networks and bandwidth Wide area networks and bandwidth Network management User access, productivity, and

performance issues Network and Internet security

Page 3: Analyse Hardware and Network Requirements - DS Chap 5

5

Analyzing Hardware Analyzing Hardware SystemsSystems

• Workstations

• Host computers

• Network devices

Page 4: Analyse Hardware and Network Requirements - DS Chap 5

5

WorkstationsWorkstations

• Elements to assess Thin-clients and terminals Speed of workstation network interface cards

(NICs) Speed of the expansion slot Basic input/output system (BIOS)

• Compile data into a table that integrates the information with your list of operating systems

Page 5: Analyse Hardware and Network Requirements - DS Chap 5

5

WorkstationsWorkstations

Page 6: Analyse Hardware and Network Requirements - DS Chap 5

5

Host ComputersHost Computers

• Can include any computer to which others connect for information or to run programs

Page 7: Analyse Hardware and Network Requirements - DS Chap 5

5

Host ComputersHost Computers

Page 8: Analyse Hardware and Network Requirements - DS Chap 5

5

Network DevicesNetwork Devices

• Print servers

• Repeaters

• Active hubs

• Passive hubs

• Bridges

• Routers

• Brouters

• Switches

• Multiplexers

• Channel service units (CSUs)

• Data service units (DSUs)

• Access servers

• RAID or RAID arrays

• CD-ROM arrays

• Packet assembler/ disassemblers (PADs)

Page 9: Analyse Hardware and Network Requirements - DS Chap 5

5

Network DevicesNetwork Devices

Page 10: Analyse Hardware and Network Requirements - DS Chap 5

5

Network Devices Network Devices

Page 11: Analyse Hardware and Network Requirements - DS Chap 5

5

Local Area Network Local Area Network Systems and BandwidthSystems and Bandwidth

• Using network diagrams

• Analyzing LAN transmission methods

• Analyzing protocols

• Analyzing IP addresses, subnets, and subnet masks

• Analyzing DNS and WINS servers

• Analyzing bandwidth

Page 12: Analyse Hardware and Network Requirements - DS Chap 5

5

Information in a LAN Information in a LAN DiagramDiagram

• Network backbone

• Servers, including locations and IP addresses

• Host computers, including locations and IP addresses

• Workstations, including locations and IP addresses, subnet masks, and subnet address information

• Network devices, including locations and IP addresses

continued

Page 13: Analyse Hardware and Network Requirements - DS Chap 5

5

Information in a LAN Information in a LAN DiagramDiagram

• Telecommunications links, including copper, fiber-optic, and wireless

• Internet connectivity

• Intranets

• Remote links

• Building locations

• Cable types

• Wireless communication links and frequencies

Page 14: Analyse Hardware and Network Requirements - DS Chap 5

5

A General Network DiagramA General Network Diagram

Page 15: Analyse Hardware and Network Requirements - DS Chap 5

5

Using Network Management Using Network Management SoftwareSoftware

Page 16: Analyse Hardware and Network Requirements - DS Chap 5

5

Analyzing LAN Analyzing LAN Transmission MethodsTransmission Methods

• Ethernet

• Token ring

• Fiber Distributed Data Interface (FDDI)

Page 17: Analyse Hardware and Network Requirements - DS Chap 5

5

EthernetEthernet

• Uses the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) access method for data transmission on a network

• Can use a bus or physical star layout

Page 18: Analyse Hardware and Network Requirements - DS Chap 5

5

Token RingToken Ring

• Developed by IBM in the 1970s; remains a primary LAN technology

• Uses a physical star topology along with the logic of a ring topology

• Each node is joined through a multistation access unit (MAU)

• Packet travels from node to node as though there were no starting or ending point

Page 19: Analyse Hardware and Network Requirements - DS Chap 5

5

FDDIFDDI

• Developed in the mid-1980s to provide higher-speed data communications

• Uses fiber-optic cable as the communications medium

• Uses timed token access method

• Capable of a 100 Mbps transfer rate using a dual-ring topology

Page 20: Analyse Hardware and Network Requirements - DS Chap 5

5

Analyzing ProtocolsAnalyzing Protocols

• Transmission Control Protocol/Internet Protocol (TCP/IP) Key protocols, used for network and Internet

communications, combined into a suite

• NetBIOS Extended User Interface (NetBEUI)

• Internet Packet Exchange/Sequence Packet Exchange (IPX/SPX)

• AppleTalk

• Systems Network Architecture (SNA) and Data Link Control (DLC)

Page 21: Analyse Hardware and Network Requirements - DS Chap 5

5

Transmission Control Transmission Control Protocol (TCP)Protocol (TCP)

• Establishes communication sessions between networked software application processes

• Provides for reliable end-to-end delivery of data by controlling data flow

• Essential functions Monitors for session requests Establishes sessions with other TCP nodes Transmits and receives data Closes transmission sessions

Page 22: Analyse Hardware and Network Requirements - DS Chap 5

5

Internet Protocol (IP) Internet Protocol (IP)

• Used in combination with TCP or UDP to enable packets to reach a destination on a local or remote network by using dotted decimal addressing

• Designed to provide for: Data transfer Packet addressing Packet routing Packet fragmentation Simple detection of packet errors

Page 23: Analyse Hardware and Network Requirements - DS Chap 5

5

NetBEUINetBEUI

• Developed by IBM in the mid-1980s

• Incorporates NetBIOS for communications across a network

• Used on early, small Microsoft-based networks

Page 24: Analyse Hardware and Network Requirements - DS Chap 5

5

IPX/SPXIPX/SPX

• Internet Packet Exchange Developed by Novell for use with its

NetWare file server operating system Can be routed A “chatty” protocol

• Sequence Packet Exchange A Novell protocol used for network

transport for application software where there is a particular need for data reliability

Page 25: Analyse Hardware and Network Requirements - DS Chap 5

5

AppleTalkAppleTalk

• A peer-to-peer protocol used on networks for communication between Macintosh computers

• AppleTalk Phase II Handles an increased number of

networked computers Interoperable with large heterogeneous

networks that host multiple protocols

Page 26: Analyse Hardware and Network Requirements - DS Chap 5

5

SNA and DLCSNA and DLC

• Systems Network Architecture A layered communications protocol used

by IBM for communication between IBM mainframe computers and terminals

• Data Link Control A protocol designed for communication

with an IBM mainframe or minicomputer Set up to use SNA communications

Page 27: Analyse Hardware and Network Requirements - DS Chap 5

5

Documenting Protocols in a Documenting Protocols in a Network DiagramNetwork Diagram

Page 28: Analyse Hardware and Network Requirements - DS Chap 5

5

Analyzing IP Addresses, Analyzing IP Addresses, Subnets, and Subnet MasksSubnets, and Subnet Masks

• Version of IP that is used, IPv4 or IPv6

• Whether IP addresses are assigned dynamically or statically

• IP address ranges that are used (or scopes when DHCP is in use)

• Subnets that are used and their locations

• Reasons why subnets are used

Page 29: Analyse Hardware and Network Requirements - DS Chap 5

5

New Features of IPv6New Features of IPv6

• 128-bit address capability

• A single address can be associated with multiple network interfaces

• Address autoconfiguration and CIDR addressing

• 40-byte header instead of IPv4’s 20-byte header (for more services)

• New IP extension headers can be implemented for special needs, including more routing and security options

Page 30: Analyse Hardware and Network Requirements - DS Chap 5

5

Analyzing DNS andAnalyzing DNS andWINS ServersWINS Servers

• Domain Name System (DNS) Resolves IP addresses to computer names Typically two zones of data

• Forward lookup zone• Reverse lookup zone

• Windows Internet Naming Service (WINS) Used with DNS Server to resolve IP addresses

and computer names on networks in which NetBIOS applications are still in use

Page 31: Analyse Hardware and Network Requirements - DS Chap 5

5

Analyzing DNS on a Analyzing DNS on a NetworkNetwork

• Operating system of the DNS server

• Location of DNS servers on the network

• Placement of primary and secondary (backup) DNS servers

• Information in forward and reverse lookup zones

• Whether or not DNS zones are automatically updated when a new device is connected

Page 32: Analyse Hardware and Network Requirements - DS Chap 5

5

DNS Forward Lookup ZoneDNS Forward Lookup Zone

Page 33: Analyse Hardware and Network Requirements - DS Chap 5

5

Analyzing the Use ofAnalyzing the Use ofWINS ServersWINS Servers

• Reason why WINS is used, such as for pre-Windows 2000 object naming

• NetBIOS naming conventions used on a network

• Location of WINS servers

Page 34: Analyse Hardware and Network Requirements - DS Chap 5

5

Analyzing BandwidthAnalyzing Bandwidth

• Bandwidth Transmission capacity of a communication

medium Typically measured in bits per second (bps, for

data transmissions) or hertz (Hz, for combined data, voice, and video transmissions in wireless communications)

Related to the capacity of the communication medium and to the transmission method

Page 35: Analyse Hardware and Network Requirements - DS Chap 5

5

Analyzing BandwidthAnalyzing Bandwidth

Page 36: Analyse Hardware and Network Requirements - DS Chap 5

5

Analyzing BandwidthAnalyzing Bandwidth

• Obtain or create network diagrams showing information about network layout (topology)

• Determine LAN transmission methods (Ethernet, token ring, FDDI)

• Determine LAN protocols (TCP/IP, IPX/SPX, NetBEUI, AppleTalk, SNA, DLC)

continued

Page 37: Analyse Hardware and Network Requirements - DS Chap 5

5

Analyzing BandwidthAnalyzing Bandwidth

• Determine IP addressing convention, including subnet masks

• Determine how IP subnets are used

• Assess the deployment of DNS, WINDS, and DHCP servers

• Determine Ethernet, token ring, FDDI, and wireless bandwidths of specific links

Page 38: Analyse Hardware and Network Requirements - DS Chap 5

5

Wide Area Network Systems Wide Area Network Systems and Bandwidthand Bandwidth

• WAN transmission methods

• WAN technologies transmitted over other WANs

• WAN bandwidth

Page 39: Analyse Hardware and Network Requirements - DS Chap 5

5

Analyzing WAN Analyzing WAN Transmission MethodsTransmission Methods

• Modem communications over regular phone lines

• X.25

• Frame relay

• ISDN (Integrated Services Digital Network)

• SMDS (switched megabit data service)

• DSL (digital subscriber line)

• ATM (asynchronous transfer mode)

• SONET (synchronous optical network)

Page 40: Analyse Hardware and Network Requirements - DS Chap 5

5

X.25 WAN ArchitectureX.25 WAN Architecture

Page 41: Analyse Hardware and Network Requirements - DS Chap 5

5

Frame Relay WAN Frame Relay WAN ArchitectureArchitecture

Page 42: Analyse Hardware and Network Requirements - DS Chap 5

5

DSL WAN ArchitectureDSL WAN Architecture

Page 43: Analyse Hardware and Network Requirements - DS Chap 5

5

Analyzing Protocol Support Analyzing Protocol Support Over WANsOver WANs

• Many WAN technologies enable other LAN and WAN technologies to operate through them

• Determine if a WAN technology is being used over another WAN technology

Page 44: Analyse Hardware and Network Requirements - DS Chap 5

5

Analyzing WAN BandwidthAnalyzing WAN Bandwidth

• Determine which WAN technologies are in use, such as modem communications, X.25, frame relay, ISDN, SMDS, DSL, ATM, and SONET

• Determine if one WAN technology is also transporting another WAN technology, such as SONET transporting ATM

• Determine the bandwidth of all WAN links

Page 45: Analyse Hardware and Network Requirements - DS Chap 5

5

ISDN Primary Rate Interface ISDN Primary Rate Interface ArchitectureArchitecture

Page 46: Analyse Hardware and Network Requirements - DS Chap 5

5

DSL BandwidthDSL Bandwidth

Page 47: Analyse Hardware and Network Requirements - DS Chap 5

5

SONET BandwidthSONET Bandwidth

Page 48: Analyse Hardware and Network Requirements - DS Chap 5

5

Analyzing Network Analyzing Network ManagementManagement

• Determine if network management protocols are used, such as SNMP or CMIP

• Determine which stations act as network agents and network management stations (NMS)

• Use the NMS and network management software to your advantage for gathering information about how the network is set up

continued

Page 49: Analyse Hardware and Network Requirements - DS Chap 5

5

Analyzing Network Analyzing Network ManagementManagement

• Find out what network management software is used and determine how it is used to manage a network

• Assess the security in place for SNMP or CMIP

• Determine if RMON is used

Page 50: Analyse Hardware and Network Requirements - DS Chap 5

5

RMON ArchitectureRMON Architecture

Page 51: Analyse Hardware and Network Requirements - DS Chap 5

5

Analyzing User Access, Produc-Analyzing User Access, Produc-tivity, and Performance Issuestivity, and Performance Issues

• Determine if users can be more productive and have better access by upgrading their computers or workstation operating systems

• Assess if most effective protocols are in use and if some protocols can be retired, such as IPX/SPX or NetBEUI

• Assess whether network bandwidth is adequate for the type of work and traffic on specific network segments

continued

Page 52: Analyse Hardware and Network Requirements - DS Chap 5

5

Analyzing User Access, Produc-Analyzing User Access, Produc-tivity, and Performance Issuestivity, and Performance Issues

• Determine if the network access order can be tuned on some workstations, such as those running Windows NT 4.0 or Windows 2000, when multiple protocols are in use

• Assess whether the network access method is appropriate for anticipated growth in user access

Page 53: Analyse Hardware and Network Requirements - DS Chap 5

5

Analyzing Network and Analyzing Network and Internet SecurityInternet Security

• Determine what account security policies are implemented on existing servers

• Determine if Kerberos and certificate security is used or if there are plans to use it

• Assess remote access policies for RAS and VPN servers

• Assess the use of encryption and authentication on all servers and hosts

continued

Page 54: Analyse Hardware and Network Requirements - DS Chap 5

5

Analyzing Network and Analyzing Network and Internet SecurityInternet Security

• Determine how routers, proxy servers, and firewalls are used for network security, including the location of those devices

• Assess what IP- and account-based restrictions are used for security on the Web, RAS, VPN, and other servers

Page 55: Analyse Hardware and Network Requirements - DS Chap 5

5

Restricting AccessRestricting Accessto a Web Siteto a Web Site

Page 56: Analyse Hardware and Network Requirements - DS Chap 5
Page 57: Analyse Hardware and Network Requirements - DS Chap 5

5

Chapter SummaryChapter Summary

• Analyzing hardware systems Workstations Host computers Network devices

• Local area network systems and bandwidth Analyzing LAN transmission methods Analyzing protocols Analyzing IP addresses, subnets, and subnet masks Analyzing DNS and WINS servers Analyzing bandwidth

continued

Page 58: Analyse Hardware and Network Requirements - DS Chap 5

5

Chapter SummaryChapter Summary

• Wide area network systems and bandwidth Analyzing WAN transmission methods Analyzing protocol support over WANs Analyzing WAN bandwidth

• Analyzing network management

• Analyzing user access, productivity, and performance issues

• Analyzing network and Internet security